Get 100percentOFF Coupon For Recon for bug bounty, penetration testers & ethical hackers Course


Course Description:

This course is totally made for web site reconnaissance  for bug bounty hunters, penetration testers & ethical hackers. This can be a intermediate stage course all of the matters are mentioned right here concerning recon on web sites.

A few of the matters are what’s reconnaissance, what’s recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your personal recon instruments and plenty of extra…

This course is totally targeted on web site recon and vulnerability evaluation.

There will likely be full methodology of web site reconnaissance, bug bounty looking, penetration testing. The movies are divided into small sections for the scholars to be taught.

All of the assets are offered within the useful resource part together with hyperlinks, pdf, payloads which might be utilized in course.

Course Curriculum :

  1. Introduction
    1. Introduction to recon
  2. Subdomain enumeration from instruments
    1. Subdomain enumeration #1
    2. Subdomain enumeration #2
    3. Subdomain enumeration #3
    4. Subdomain enumeration #4
    5. Subdomain bruteforcing
    6. Filtering distinctive domains
    7. Subdomain generator
  3. Subdomain enumeration from web sites
    1. Subdomain enumeration from web site #1
    2. Subdomain enumeration from web site #2
    3. Subdomain enumeration from web site #3
    4. Subdomain enumeration from web site #4
  4. Filtering reside domains
    1. Filtering reside domains
  5. URL extraction from the web
    1. URL extraction from the web #1
    2. URL extraction from the web #2
  6. Discovering parameters
    1. Discovering parameters
    2. Parameter bruteforcer
  7. Discovering URL from previous
    1. URL from previous
  8. Sorting urls
    1. Sorting url for vulnerabilities
  9. Automation for changing parameters with Payloads
    1. Automation for changing parameters with Payloads
  10. Footprinting web sites ( Web site recon )
    1. Whatweb recon
    2. Netcraft
    3. Safety headers
    4. Dnsdumpmaster
    5. Whois recon
    6. Mxtoolbox
    7. OSINT
    8. Maltego
  11. Browser addons for recon
    1. wappalyzer
    2. retire.js
    3. shodan
    4. Knoxx
    5. Hack-tools addon
  12. WAF idetification
    1. WAF identification
  13. Subdomain takeover
    1. HostileSubBruteForcer
    2. Sub404
    3. Subjack
  14. Fuzzing (Content material-Discovery)
    1. dirb
    2. ffuf
  15. Port scanning
    1. Introduction to nmap
    2. Port specification in nmap
    3. Service and model detection from nmap
    4. Firewall bypass method
  16. Quick port scanning
    1. nabbu
    2. masscan
  17. Visible recon
    1. Gowitness
  18. Google dorking
    1. Introduction to google dorking
    2. Understnding the URL construction
    3. Syntax of google dorking
    4. Google dorking operators
    5. Google search operators ( Half – 1 )
    6. Google search operators ( Half – 2 )
  19. Google dorking sensible
    1. Introduction to sensible google dorking
    2. discover listing itemizing vulnerabilities ?
    3. dork for wordpress plugins and thems ?
    4. dork for internet servers variations ?
    5. dork for utility generated system experiences ?
    6. Dorking for SQLi
    7. Studying supplies for google dorking
  20. Suggestions for advance google dorking
    1. Tip #1
    2. Tip #2
    3. Tip #3
  21. Shodan dorking
    1. Intro to shodan dorking
    2. Shodan internet interface
    3. Shodan search filters
  22. Shodan dorking sensible
    1. Discovering server
    2. Discovering fIles and directories
    3. Discovering working programs
    4. Discovering compromised units and web sites
  23. Shodan command line
    1. Introduction to shodan command line
    2. Sensible shodan in command line
  24. Github dorking
    1. Introduction to github dorking
    2. Github dorking sensible
  25. Vulnerability scanning
    1. Nuclei
    2. Wp-Scan
    3. Scanning with burpsuite
  26. Metasploit for recon
    1. DNS recon utilizing metasploit
    2. Sub-domain enumeration utilizing metasploit
    3. E-mail tackle discovering
  27. Port scanning utilizing metasploit
    1. TCP SYN port scan utilizing metasploit
    2. SSH model detection
    3. FTP model enumeration
    4. MySQL model detection
    5. HTTP enumeration
  28. Payloads for bug bounty hunters
    1. Payloads for bug hunters and enetration testers
  29. create instruments for recon ?
    1. SSRF finder instrument
    2. XSS discovering too
    3. URL extractor from javascript recordsdata
    4. Full web site recon instrument
  30. Bonus
    1. Bonus video

Thanks 🙂

Vivek Pandit

Who this course is for:

  • Bug bounty hunters, penetration testers, ethical hackers and and so on.



Udemy Coupon

Leave a comment

Your email address will not be published. Required fields are marked *