More

    100% Discount || Recon For Bug Bounty, Penetration Testers & Ethical Hackers

    Telegram Messenger | LinkedIn

    Recon For Bug Bounty, Penetration Testers & Ethical Hackers

    Requirements

    • Basic knowledge of linux is required
    • Basic knowledge of vulnerabilities

    Description

    This course is fully made for website reconnaissance  for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.

    Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more…

    This course is fully focused on website recon and vulnerability assessment.

    There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.

    All the resources are provided in the resource section including links, pdf, payloads that are used in course.

    Course Curriculum :

    1. Introduction
      1. Introduction to recon
    2. Subdomain enumeration from tools
      1. Subdomain enumeration #1
      2. Subdomain enumeration #2
      3. Subdomain enumeration #3
      4. Subdomain enumeration #4
      5. Subdomain bruteforcing
      6. Filtering unique domains
      7. Subdomain generator
    3. Subdomain enumeration from websites
      1. Subdomain enumeration from website #1
      2. Subdomain enumeration from website #2
      3. Subdomain enumeration from website #3
      4. Subdomain enumeration from website #4
    4. Filtering live domains
      1. Filtering live domains
    5. URL extraction from the internet
      1. URL extraction from the internet #1
      2. URL extraction from the internet #2
    6. Finding parameters
      1. Finding parameters
      2. Parameter bruteforcer
    7. Finding URL from past
      1. URL from past
    8. Sorting urls
      1. Sorting url for vulnerabilities
    9. Automation for replacing parameters with Payloads
      1. Automation for replacing parameters with Payloads
    10. Footprinting websites ( Website recon )
      1. Whatweb recon
      2. Netcraft
      3. Security headers
      4. Dnsdumpmaster
      5. Whois recon
      6. Mxtoolbox
      7. OSINT
      8. Maltego
    11. Browser addons for recon
      1. wappalyzer
      2. retire.js
      3. shodan
      4. Knoxx
      5. Hack-tools addon
    12. WAF idetification
      1. WAF identification
    13. Subdomain takeover
      1. HostileSubBruteForcer
      2. Sub404
      3. Subjack
    14. Fuzzing (Content-Discovery)
      1. dirb
      2. ffuf
    15. Port scanning
      1. Introduction to nmap
      2. Port specification in nmap
      3. Service and version detection from nmap
      4. Firewall bypass technique
    16. Fast port scanning
      1. nabbu
      2. masscan
    17. Visual recon
      1. Gowitness
    18. Google dorking
      1. Introduction to google dorking
      2. Understnding the URL structure
      3. Syntax of google dorking
      4. Google dorking operators
      5. Google search operators ( Part – 1 )
      6. Google search operators ( Part – 2 )
    19. Google dorking practical
      1. Introduction to practical google dorking
      2. How to find directory listing vulnerabilities ?
      3. How to dork for wordpress plugins and thems ?
      4. How to dork for web servers versions ?
      5. How to dork for application generated system reports ?
      6. Dorking for SQLi
      7. Reading materials for google dorking
    20. Tips for advance google dorking
      1. Tip #1
      2. Tip #2
      3. Tip #3
    21. Shodan dorking
      1. Intro to shodan dorking
      2. Shodan web interface
      3. Shodan search filters
    22. Shodan dorking practical
      1. Finding server
      2. Finding fIles and directories
      3. Finding operating systems
      4. Finding compromised devices and websites
    23. Shodan command line
      1. Introduction to shodan command line
      2. Practical shodan in command line
    24. Github dorking
      1. Introduction to github dorking
      2. Github dorking practical
    25. Vulnerability scanning
      1. Nuclei
      2. Wp-Scan
      3. Scanning with burpsuite
    26. Metasploit for recon
      1. DNS recon using metasploit
      2. Sub-domain enumeration using metasploit
      3. E-mail address finding
    27. Port scanning using metasploit
      1. TCP SYN port scan using metasploit
      2. SSH version detection
      3. FTP version enumeration
      4. MySQL version detection
      5. HTTP enumeration
    28. Payloads for bug bounty hunters
      1. Payloads for bug hunters and enetration testers
    29. How to create tools for recon ?
      1. SSRF finder tool
      2. XSS finding too
      3. URL extractor from javascript files
      4. Full website recon tool
    30. Bonus
      1. Bonus video

    Thank you 🙂

    Vivek Pandit

    Who this course is for:

    • Bug bounty hunters, penetration testers, ethical hackers and etc.


    Get this Deal


    Get this Deal

    #Recon #Bug #Bounty #Penetration #Testers #Ethical #Hackers #Get this Deal
    تخفيضات,كوبونات,كوبون,عروض,كوبون كل يوم
    Get this Deal,Get this Deal
    udemy sale,udemy for business,udemy discount,udemy gutschein,business administration,discount factor,course deutsch,course catalogue,udemy course discount,javascript courses online,javascript course,freebies,toefl speaking,excel courses online,excel courses,excel templates dashboard,software engineering course online,software engineering course,

    Related articles