Premium Only Content

Beginner's Guide to DNSdumpster: DNS Reconnaissance Made Easy
DNSdumpster is another cybersecurity tool used for passive reconnaissance, specifically focusing on DNS enumeration. It allows users to gather information about domain names, IP addresses, and other related data to map out an organization's internet-facing assets
DNS Dumpster
00:12 - dns dumpster introduction
01:23 - searching sweshi.com
01:30 - IP information geolocation
02:03 - DNS server information
02:30 - mail exchange information
02:44 - text records
02:50 - mapping the domain
03:27 - google search
Google Footprinting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/GoogleFootprinting.php
theHarvester tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/theHarv3ster%20-%20Network%20Reconnaissance%20tool%20tutorial.php
sublister tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sublist3r%20tutorial.php
censys free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/censys%20tutorial.php
shodan free tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/shodan%20tutorial.php
dns dumpster tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dns%20dumpster%20tutorial.php
spiderfoot tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/spiderfoot%20tutorial.php
nmap tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Nikto web server scanning Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Dirbuster web directory scanner Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/dirbuster%20tutorial.php
Nmap port scanner:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nmap%20tutorial.php
Legion port scanner and vulnerability scanning tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/legion%20tutorial.php
hping3 packet crafting tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/hping3%20tutorial.php
amap scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/amap%20tutorial.php
masscan fast port scanner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/masscan%20tutorial.php
netcat tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/netcat%20tutorial.php
VULNERABILITY SCANNING TUTORIALS
Nessus tenable tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nessus%20tenable%20essentials%20tutorial.php
Nikto tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/nikto%20tutorial.php
Exploit tools:
Metasploit beginner tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/metasploit%20tutorial.php
SQL Map tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/sqlmap%20tutorial.php
routersploit tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/routersploit.php
FORENSIC INVESTIGATION TOOLS:
Wireshark Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/wireshark%20tutorial.php
LastActivityView tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/lastActivityView%20tutorial.php
Process Monitor Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/Process%20Monitor%20Tutorial.php
Autoruns Tutorial:
https://sweshi.com/CyberSecurityTutorials/Penetration%20Testing%20and%20Ethical%20Hacking/autoruns%20tutorial.php
-
1:03:04
BonginoReport
3 hours agoBomb Squad Investigates Package at TPUSA HQ - Nightly Scroll w/ Hayley Caronia (Ep.136)
173K60 -
1:23:11
Kim Iversen
5 hours agoDennis Kucinich Exposes 9/11 Israel's Lies
91.5K152 -
LIVE
The Mike Schwartz Show
3 hours agoTHE MIKE SCHWARTZ SHOW with DR. MICHAEL J SCHWARTZ 09-17-2025
4,205 watching -
LIVE
Mally_Mouse
21 hours ago📣Telescreen Talks - LIVE!
174 watching -
LIVE
Quite Frankly
7 hours agoPsychotic Voices from Another World, Part 2 | Jerry Marzinsky & Judy Gregerson 9/17/25
516 watching -
LIVE
SpartakusLIVE
3 hours agoTower DOMINATION, Specialist, and INFINITE Dubs || Duos w/ Twitty , Quads Later w/ The Boys
175 watching -
7:04:40
Dr Disrespect
9 hours ago🔴LIVE - DR DISRESPECT - ARENA BREAKOUT: INFINITE - ESCAPE OR LOSE EVERYTHING!
136K7 -
LIVE
SavageJayGatsby
2 hours ago📣Telescreen Talks - LIVE!
67 watching -
1:07:53
TheCrucible
4 hours agoThe Extravaganza! EP: 38 (9/17/25)
124K23 -
1:12:15
Candace Show Podcast
4 hours agoWho Ordered The Hit On Charlie Kirk? | Candace Ep 237
92K317