Premium Only Content

Beginner's Guide to DNSdumpster: DNS Reconnaissance Made Easy
DNSdumpster is another cybersecurity tool used for passive reconnaissance, specifically focusing on DNS enumeration. It allows users to gather information about domain names, IP addresses, and other related data to map out an organization's internet-facing assets
DNS Dumpster
00:12 - dns dumpster introduction
01:23 - searching sweshi.com
01:30 - IP information geolocation
02:03 - DNS server information
02:30 - mail exchange information
02:44 - text records
02:50 - mapping the domain
03:27 - google search
Google Footprinting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/GoogleFootprinting.php
theHarvester tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/theHarv3ster%20-%20Network%20Reconnaissance%20tool%20tutorial.php
sublister tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sublist3r%20tutorial.php
censys free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/censys%20tutorial.php
shodan free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/shodan%20tutorial.php
dns dumpster tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dns%20dumpster%20tutorial.php
spiderfoot tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/spiderfoot%20tutorial.php
nmap tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Nikto web server scanning Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Dirbuster web directory scanner Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dirbuster%20tutorial.php
Nmap port scanner:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Legion port scanner and vulnerability scanning tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/legion%20tutorial.php
hping3 packet crafting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/hping3%20tutorial.php
amap scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/amap%20tutorial.php
masscan fast port scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/masscan%20tutorial.php
netcat tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/netcat%20tutorial.php
VULNERABILITY SCANNING TUTORIALS
Nessus tenable tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nessus%20tenable%20essentials%20tutorial.php
Nikto tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Exploit tools:
Metasploit beginner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/metasploit%20tutorial.php
SQL Map tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sqlmap%20tutorial.php
routersploit tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/routersploit.php
FORENSIC INVESTIGATION TOOLS:
Wireshark Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/wireshark%20tutorial.php
LastActivityView tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/lastActivityView%20tutorial.php
Process Monitor Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/Process%20Monitor%20Tutorial.php
Autoruns Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/autoruns%20tutorial.php
-
2:05:36
Inverted World Live
11 hours agoSaint's Tomb Opened for First Time in 800 Years for Ancient Ritual | Ep. 121
98.2K16 -
2:43:30
TimcastIRL
8 hours agoNY AG Indicted For FRAUD, Faces 30 Years In Prison, $1 MILLION FINE | Timcast IRL
223K101 -
1:09:16
Man in America
18 hours agomRNA 2.0: This Frightening Tech Can Target Your BRAIN Using Biological Post Codes
57.9K21 -
1:28:31
The Charlie Kirk Show
8 hours agoTHOUGHTCRIME Ep. 100 — Turning Point Halftime? Potatoes and Katie Porter? Hasan the Dog Shocker?
116K59 -
6:33:19
SpartakusLIVE
9 hours agoNEW Update, NEW Meta || Zombies Mode is BACK - Smokes NURFED
69.5K5 -
13:10
Robbi On The Record
8 hours ago $9.05 earnedThe War on Christians | China’s Surveillance & Nigeria’s Killing Fields
48.4K34 -
1:24:49
Flyover Conservatives
1 day agoYour Home Just Became a Healing Room — The Truth About Red Light & Med Bed - Jonathan Otto | FOC Show
47K8 -
2:11:35
Mally_Mouse
4 days ago🎮 Throwback Thursday! Let's Play: Kingdom Hearts 1 pt. 2
35K2 -
3:00:37
Barry Cunningham
11 hours agoBREAKING NEWS: LETITIA JAMES INDICTED FOR MORTGAGE FRAUD!!! LIBTARD TEARS ARE FLOWING!
66.4K44 -
1:17:42
Glenn Greenwald
11 hours agoUS/Venezuela Escalations: Revisiting Key Developments and the Push for Regime Change | SYSTEM UPDATE SPECIAL
121K164