hi guys, if the asn belongs to an ISP do u skip that part of recon? because from my understanding if the target does not have its own asn, it will be hard for the hunter to do a recon using the ISP's asn because the results of the recon will just give so many output that is not even related to the target because the asn is too large share ur insights on this matter, pls. thanks
Thank you so much, Jason, for this talk.
You can use masscan to speed up things instead of nmap to scan the ip ranges that you get from asnmap
hi when he said subfinder amass and B aught which tool did he refered to as bought
Jasons's content is always orginal and great
where is the cloud ip range file 11_12_2023_DB.txt ?
Where can we get access to the presentation given by Jason?
Yes I need it too
Does anyone got the slides?
you gat cool staff
Nmap remains king, these kids got nothing new for me
from where can i get the other recon topics please??
Where is bug🙄
In my pocket😅
It's recon bro it's not cve exploit or vulnerability scanning when u use recon u will find vuln
did you even read the title?
whats the flag to use in httpx to scan json files i.e., js loose. Do anyone know
hi guys,
if the asn belongs to an ISP do u skip that part of recon?
because from my understanding if the target does not have its own asn, it will be hard for the hunter to do a recon using the ISP's asn because the results of the recon will just give so many output that is not even related to the target because the asn is too large
share ur insights on this matter, pls. thanks
yes u skip coz the ipranges will include many out of scoope targets