web-security
web-security copied to clipboard
[Enumeration & Recon] More recon techniques
Present more recon techniques in the session and slides, but pay attention that we should focus on web, not go (too much) into infrastructure/network. We could start by telling about GitHub Dorks/gists leaks and also create a challenge with a Gist on our repo. :)