Image by Soumil Kumar from Pexels

Ethical Hacking (part 1.0/20): Footprinting and Reconnaissance with examples and tools

Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you to prevent cyber attacks of your personal or business resources.

Note 2: This article is being updated regularly. The latest update is as of 29/05/2021.

--

--

--

Data Scientist with 5+ years of broad-based experience in building data-intensive solutions for diverse industries

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Security in DeFi

Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber…

Announcement on TokenPocket Volunteers Recruitment

AMA recap: OntoWalet x EDNS Domains

Risk Refracted

GDPR Diary: What I’ve Learned Since Becoming A Data Protection Officer

Time to Go Nuclear Against Anti-Internet Privacy Laws

What is Web 3.0? The Grandpa Version.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Maciej Zalwert

Maciej Zalwert

Data Scientist with 5+ years of broad-based experience in building data-intensive solutions for diverse industries

More from Medium

2nd Simple & White-collar things about CyberSecurity

Lopsided routing, a stealthy hole punch into FortiGate

No leaks seen in Beacon Home

This is part 2 of the reverse engineering ippsRSA library to induce faults.

WLAN ATTACK METHODS OVERVIEW