Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Recon for bug bounty, penetration testers & ethical hackers


itsMe

Recommended Posts

This is the hidden content, please

Recon for bug bounty, penetration testers & ethical hackers. The full methodology of website reconnaissance and bug bounty.

What you’ll learn

    Recon on websites
    Gathering subdomains
    Gathering URLs
    Gathering parameters
    Information gathering
    Collecting sensitive data from websites
    Deep recon on the website

Requirements

    Basic knowledge of Linux is required
    Basic knowledge of vulnerabilities

Description

This course is entirely made for website reconnaissance for bug bounty hunters, penetration testers & ethical hackers. This is an intermediate-level course. All the topics are discussed here regarding recon on websites.

Some of the topics are what is a survey, what is recon, recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter brute-forcing, Creating your recon tools, and many more…
This course is entirely focused on website recon and vulnerability assessment.

There will be the whole methodology of website reconnaissance, bug bounty hunting, and penetration testing. The videos are divided into small sections for the students to learn.

All the resources are provided in the resource section, including links, pdf, and payloads used in the course.

Course Curriculum :

    Introduction
        Introduction to recon
    Subdomain enumeration from tools
        Subdomain enumeration #1
        Subdomain enumeration #2
        Subdomain enumeration #3
        Subdomain enumeration #4
        Subdomain bruteforcing
        Filtering unique domains
        Subdomain generator
    Subdomain enumeration from websites
        Subdomain enumeration from website #1
        Subdomain enumeration from website #2
        Subdomain enumeration from website #3
        Subdomain enumeration from website #4
    Filtering live domains
        Filtering live domains
    URL extraction from the internet
        URL extraction from the internet #1
        URL extraction from the internet #2
    Finding parameters
        Finding parameters
        Parameter bruteforcer
    Finding URLs from past
        URL from past
    Sorting urls
        Sorting URLs for vulnerabilities
    Automation for replacing parameters with Payloads
        Automation for replacing parameters with Payloads
    Footprinting websites ( Website recon )
        What web recon
        Netcraft
        Security headers
        Dnsdumpmaster
        Whois recon
        Mxtoolbox
        OSINT
        Maltego
    Browser add-ons for recon
        analyzer
        retire.js
        shodan
        Knoxx
        Hack-tools addon
    WAF identification
        WAF identification
    Subdomain takeover
        HostileSubBruteForcer
        Sub404
        Subject
    Fuzzing (Content-Discovery)
        dir
        ffuf
    Port scanning
        Introduction to Nmap
        Port specification in nmap
        Service and version detection from nmap
        Firewall bypass technique
    Fast port scanning
        Nabu
        mass can
    Visual recon
        Gowitness
    Google Dorking
        Introduction to google Dorking
        Understanding the URL structure
        Syntax of google Dorking
        Google Dorking operators
        Google search operators ( Part – 1 )
        Google search operators ( Part – 2 )
    Google Dorking practical
        Introduction to practical google Dorking
        How to find directory listing vulnerabilities?
        How to dork for WordPress plugins and themes?
        How to work for web server versions?
        How to dork for application-generated system reports?
        Dorking for SQLi
        Reading materials for google Dorking
    Tips for advanced google Dorking
        Tip #1
        Tip #2
        Tip #3
    Shodan Dorking
        Intro to shodan Dorking
        Shodan web interface
        Shodan search filters
    Shodan Dorking practical
        Finding server
        Finding files and directories
        Finding operating systems
        Finding compromised devices and websites
    Shodan command line
        Introduction to the shodan command line
        Practical shodan in command line
    Github Dorking
        Introduction to GitHub Dorking
        Github Dorking practical
    Vulnerability scanning
        Nuclei
        Wp-Scan
        Scanning with burp suite
    Metasploit for recon
        DNS recon using Metasploit
        Sub-domain enumeration using Metasploit
        E-mail address finding
    Port scanning using Metasploit
        TCP SYN port scan using Metasploit
        SSH version detection
        FTP version enumeration
        MySQL version detection
        HTTP enumeration
    Payloads for bug bounty hunters
        Payloads for bug hunters and penetration testers
    How to create tools for recon?
        SSRF finder tool
        XSS finding too
        URL extractor from javascript files
        Full website recon tool
    Bonus
        Bonus video

Thank you 🙂

Vivek Pandit

Who this course is for:

    Bug bounty hunters, penetration testers, ethical hackers, etc.

This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.