Premium Only Content

Beginner's Guide to DNSdumpster: DNS Reconnaissance Made Easy
DNSdumpster is another cybersecurity tool used for passive reconnaissance, specifically focusing on DNS enumeration. It allows users to gather information about domain names, IP addresses, and other related data to map out an organization's internet-facing assets
DNS Dumpster
00:12 - dns dumpster introduction
01:23 - searching sweshi.com
01:30 - IP information geolocation
02:03 - DNS server information
02:30 - mail exchange information
02:44 - text records
02:50 - mapping the domain
03:27 - google search
Google Footprinting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/GoogleFootprinting.php
theHarvester tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/theHarv3ster%20-%20Network%20Reconnaissance%20tool%20tutorial.php
sublister tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sublist3r%20tutorial.php
censys free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/censys%20tutorial.php
shodan free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/shodan%20tutorial.php
dns dumpster tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dns%20dumpster%20tutorial.php
spiderfoot tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/spiderfoot%20tutorial.php
nmap tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Nikto web server scanning Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Dirbuster web directory scanner Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dirbuster%20tutorial.php
Nmap port scanner:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Legion port scanner and vulnerability scanning tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/legion%20tutorial.php
hping3 packet crafting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/hping3%20tutorial.php
amap scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/amap%20tutorial.php
masscan fast port scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/masscan%20tutorial.php
netcat tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/netcat%20tutorial.php
VULNERABILITY SCANNING TUTORIALS
Nessus tenable tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nessus%20tenable%20essentials%20tutorial.php
Nikto tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Exploit tools:
Metasploit beginner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/metasploit%20tutorial.php
SQL Map tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sqlmap%20tutorial.php
routersploit tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/routersploit.php
FORENSIC INVESTIGATION TOOLS:
Wireshark Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/wireshark%20tutorial.php
LastActivityView tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/lastActivityView%20tutorial.php
Process Monitor Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/Process%20Monitor%20Tutorial.php
Autoruns Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/autoruns%20tutorial.php
-
3:19:34
Laura Loomer
6 hours agoEP135: Champagne Communism: Zohran Mamdani's Ugandan Compound EXPOSED
36.4K8 -
28:39
The Why Files
3 days agoCryptids Vol. 4 | Bunyips, Yowie and Australian Nightmare Fuel
50.4K38 -
1:07:06
Mike Rowe
18 days agoThe Fight For America's Heartland | Salena Zito #442 | The Way I Heard It
35.4K48 -
2:43:30
TimcastIRL
7 hours agoSouth Park Goes FULL CHARLIE KIRK, Latest Episode ROASTS Trump Again | Timcast IRL
218K110 -
DVR
SpartakusLIVE
7 hours agoThe Return of the KING of Content
51K -
10:05
MattMorseTV
10 hours ago $8.39 earnedHe actually did it...
60.5K26 -
1:32:39
Anthony Rogers
1 day agoEpisode 376 - Todd Schowalter
32.9K -
3:42:07
megimu32
7 hours agoOTS: Movie Tie-In Games + Remakes: Let’s Play Memory Lane
46.8K5 -
1:15:06
Adam Does Movies
14 hours ago $1.03 earnedTalking Movies + Ask Me Anything - LIVE
32K8 -
1:17:18
Glenn Greenwald
1 day agoWhat are CBS News' Billionaire Heirs Doing with Bari Weiss? With Ryan Grim on the Funding Behind It; Europe Capitulates to Trump Again | SYSTEM UPDATE #494
116K92