$100

Recon for bug bounty, penetration testers & ethical hackers course

0 ratings
I want this!

Recon for bug bounty, penetration testers & ethical hackers course

$100
0 ratings

After payment, you will receive a text containing a link containing the full course


Recon for bug bounty, penetration testers & ethical hackers. The full methodology of website reconnaissance and bug bounty.

What you’ll learn

Recon for bug bounty, penetration testers & ethical hackers

  • Recon on websites
  • Gathering subdomains
  • Gathering URLs
  • Gathering parameters
  • Information gathering
  • Collecting sensitive data from websites
  • Deep recon on the website

Requirements

  • Basic knowledge of Linux is required
  • Basic knowledge of vulnerabilities

Description

This course is entirely made for website reconnaissance for bug bounty hunters, penetration testers & ethical hackers. This is an intermediate-level course. All the topics are discussed here regarding recon on websites.

Some of the topics are what is a survey, what is recon, recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter brute-forcing, Creating your recon tools, and many more…

This course is entirely focused on website recon and vulnerability assessment.There will be the whole methodology of website reconnaissance, bug bounty hunting, and penetration testing. The videos are divided into small sections for the students to learn.

All the resources are provided in the resource section, including links, pdf, and payloads used in the course.

Course Curriculum :

  1. Introduction
  2. Introduction to recon
  3. Subdomain enumeration from tools
  4. Subdomain enumeration #1
  5. Subdomain enumeration #2
  6. Subdomain enumeration #3
  7. Subdomain enumeration #4
  8. Subdomain bruteforcing
  9. Filtering unique domains
  10. Subdomain generator
  11. Subdomain enumeration from websites
  12. Subdomain enumeration from website #1
  13. Subdomain enumeration from website #2
  14. Subdomain enumeration from website #3
  15. Subdomain enumeration from website #4
  16. Filtering live domains
  17. Filtering live domains
  18. URL extraction from the internet
  19. URL extraction from the internet #1
  20. URL extraction from the internet #2
  21. Finding parameters
  22. Finding parameters
  23. Parameter bruteforcer
  24. Finding URLs from past
  25. URL from past
  26. Sorting urls
  27. Sorting URLs for vulnerabilities
  28. Automation for replacing parameters with Payloads
  29. Automation for replacing parameters with Payloads
  30. Footprinting websites ( Website recon )
  31. What web recon
  32. Netcraft
  33. Security headers
  34. Dnsdumpmaster
  35. Whois recon
  36. Mxtoolbox
  37. OSINT
  38. Maltego
  39. Browser add-ons for recon
  40. analyzer
  41. retire.js
  42. shodan
  43. Knoxx
  44. Hack-tools addon
  45. WAF identification
  46. WAF identification
  47. Subdomain takeover
  48. HostileSubBruteForcer
  49. Sub404
  50. Subject
  51. Fuzzing (Content-Discovery)
  52. dir
  53. ffuf
  54. Port scanning
  55. Introduction to Nmap
  56. Port specification in nmap
  57. Service and version detection from nmap
  58. Firewall bypass technique
  59. Fast port scanning
  60. Nabu
  61. mass can
  62. Visual recon
  63. Gowitness
  64. Google Dorking
  65. Introduction to google Dorking
  66. Understanding the URL structure
  67. Syntax of google Dorking
  68. Google Dorking operators
  69. Google search operators ( Part – 1 )
  70. Google search operators ( Part – 2 )
  71. Google Dorking practical
  72. Introduction to practical google Dorking
  73. How to find directory listing vulnerabilities?
  74. How to dork for WordPress plugins and themes?
  75. How to work for web server versions?
  76. How to dork for application-generated system reports?
  77. Dorking for SQLi
  78. Reading materials for google Dorking
  79. Tips for advanced google Dorking
  80. Tip #1
  81. Tip #2
  82. Tip #3
  83. Shodan Dorking
  84. Intro to shodan Dorking
  85. Shodan web interface
  86. Shodan search filters
  87. Shodan Dorking practical
  88. Finding server
  89. Finding files and directories
  90. Finding operating systems
  91. Finding compromised devices and websites
  92. Shodan command line
  93. Introduction to the shodan command line
  94. Practical shodan in command line
  95. Github Dorking
  96. Introduction to GitHub Dorking
  97. Github Dorking practical
  98. Vulnerability scanning
  99. Nuclei
  100. Wp-Scan
  101. Scanning with burp suite
  102. Metasploit for recon
  103. DNS recon using Metasploit
  104. Sub-domain enumeration using Metasploit
  105. E-mail address finding
  106. Port scanning using Metasploit
  107. TCP SYN port scan using Metasploit
  108. SSH version detection
  109. FTP version enumeration
  110. MySQL version detection
  111. HTTP enumeration
  112. Payloads for bug bounty hunters
  113. Payloads for bug hunters and penetration testers
  114. How to create tools for recon?
  115. SSRF finder tool
  116. XSS finding too
  117. URL extractor from javascript files
  118. Full website recon tool


Who this course is for:

  • Bug bounty hunters, penetration testers, ethical hackers, etc.
I want this!
30 - day refund

After payment, you will receive a text containing a link containing the full course

Copy product URL