Successful hacking if often built upon successful intelligence gathering. But how much time and effort is required to gather actionable data points?
Even if you can find an efficient open-source tool, its behavior or signature may be detected and prevented. Nessus is noisy, and many engagements have too many hosts for manual analysis.
We will discuss techniques, tools, and tricks utilizing Python, to acquire information on large scale, as quietly as possible.
Currently work at Alias performing penetration tests, social engineering, digital forensics, and developing security tools.
I can explain the concepts on every level from Executive to Engineer.
Level 0, Blue Team Village