![BrakeSec Education Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/f0/95/3e/f0953e48-be1e-60df-72d5-c863223e4d75/mza_8232316433178170329.png/100x100bb.jpg)
Reconnaissance: Finding necessary info during a pentest
BrakeSec Education Podcast
English - August 25, 2014 09:30 - 48 minutes - 33.4 MB - ★★★★★ - 98 ratingsTech News News Technology cisa cissp legal pentesting podcasts application compliance computersecurity cybersecurity education Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Previous Episode: Mr. Boettcher made a thing! Setting up a proper Debian install!
Next Episode: Malware, and Malware Sentinel -- with Michael Gough Pt.1
I had a healthy debate with Mr. Boettcher this week about the merits of doing recon for a pentest. Mr. Boettcher is a heavy duty proponent of it, and I see it as a necessary evil, but not one that I consider important. We hash it out, and find some common ground this week.
People search links:
Spokeo - http://www.spokeo.com/
Pipl - https://pipl.com/
Sec Filings site: http://www.sec.gov/edgar/searchedgar/webusers.htm
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/