Recon For Bug Bounty, Penetration Testers & Ethical Hackers For Free With Certification | Free Udemy Course | First 1000 Users for Free |


 


 

 









Recon For Bug Bounty, Penetration Testers & Ethical Hackers


Maximize your bug bounty hunting with expert-led recon course. Info gathering, tools & techniques covered.



What you'll learn
  • Web Reconnaissance: Unlocking the Mysteries of Websites for Competitive Advantage
  • Beyond the Main Domain: Expert Tips for Discovering Subdomains
  • URL Mining: Advanced Techniques for Gathering Valuable Data and Insights
  • Parameter Discovery: Advanced Techniques for Uncovering Valuable Data
  • Information Mining: How to Unleash the Power of Data Through Smart Gathering
  • Unlocking the Power of Information: Safely Gathering Sensitive Data from Websites
  • Uncover the Hidden Truth: Mastering Deep Recon on Websites

Requirements

  • Basic knowledge of linux is required
  • Basic knowledge of vulnerabilities

Description

This course is fully made for website reconnaissance  for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.


Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more...


This course is fully focused on website recon and vulnerability assessment.


There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.


All the resources are provided in the resource section including links, pdf, payloads that are used in course.




Course Curriculum :


Introduction


Introduction to recon


Subdomain enumeration from tools


Subdomain enumeration #1


Subdomain enumeration #2


Subdomain enumeration #3


Subdomain enumeration #4


Subdomain bruteforcing


Filtering unique domains


Subdomain generator


Subdomain enumeration from websites


Subdomain enumeration from website #1


Subdomain enumeration from website #2


Subdomain enumeration from website #3


Subdomain enumeration from website #4


Filtering live domains


Filtering live domains


URL extraction from the internet


URL extraction from the internet #1


URL extraction from the internet #2


Finding parameters


Finding parameters


Parameter bruteforcer


Finding URL from past


URL from past


Sorting urls


Sorting url for vulnerabilities


Automation for replacing parameters with Payloads


Automation for replacing parameters with Payloads


Footprinting websites ( Website recon )


Whatweb recon


Netcraft


Security headers


Dnsdumpmaster


Whois recon


Mxtoolbox


OSINT


Maltego


Browser addons for recon


wappalyzer


retire.js


shodan


Knoxx


Hack-tools addon


WAF idetification


WAF identification


Subdomain takeover


HostileSubBruteForcer


Sub404


Subjack


Fuzzing (Content-Discovery)


dirb


ffuf


Port scanning


Introduction to nmap


Port specification in nmap


Service and version detection from nmap


Firewall bypass technique


Fast port scanning


nabbu


masscan


Visual recon


Gowitness


Google dorking


Introduction to google dorking


Understnding the URL structure


Syntax of google dorking


Google dorking operators


Google search operators ( Part - 1 )


Google search operators ( Part - 2 )


Google dorking practical


Introduction to practical google dorking


How to find directory listing vulnerabilities ?


How to dork for wordpress plugins and thems ?


How to dork for web servers versions ?


How to dork for application generated system reports ?


Dorking for SQLi


Reading materials for google dorking


Tips for advance google dorking


Tip #1


Tip #2


Tip #3


Shodan dorking


Intro to shodan dorking


Shodan web interface


Shodan search filters


Shodan dorking practical


Finding server


Finding fIles and directories


Finding operating systems


Finding compromised devices and websites


Shodan command line


Introduction to shodan command line


Practical shodan in command line


Github dorking


Introduction to github dorking


Github dorking practical


Vulnerability scanning


Nuclei


Wp-Scan


Scanning with burpsuite


Metasploit for recon


DNS recon using metasploit


Sub-domain enumeration using metasploit


E-mail address finding


Port scanning using metasploit


TCP SYN port scan using metasploit


SSH version detection


FTP version enumeration


MySQL version detection


HTTP enumeration


Payloads for bug bounty hunters


Payloads for bug hunters and enetration testers


How to create tools for recon ?


SSRF finder tool


XSS finding too


URL extractor from javascript files


Full website recon tool


Bonus


Bonus video


Thank you :)


Vivek Pandit



Who this course is for:

  • Bug bounty hunters, penetration testers, ethical hackers and etc.

Course content

30 sections • 91 lectures • 9h 14m total length

Preview

05:43

Subdomain recon enumeration #1

09:17

Subdomain recon enumeration #2

06:27

Subdomain recon enumeration #3

06:16

Subdomain recon enumeration #4

03:42

Preview

05:42

Filtering unique domains

03:20

Subdomain generator

08:26

Preview

03:02

Subdomain enumeration from website #2

06:19

Subdomain enumeration from website #3

03:32

Subdomain enumeration from website #4

03:58

Filtering live domains

16:15

URL extraction from the internet #1

09:14

URL extraction from the internet #2

08:09

Finding parameters

03:14

Parameter bruteforcer

04:46

URL recon from past

04:32

Sorting url for vulnerabilities

11:07

Automation for replacing parameters with Payloads

04:58

Preview

09:16

Netcraft

04:45

Security headers

02:48

Dnsdumpmaster

04:09

Whois recon

04:16

Mxtoolbox

03:02

OSINT recon

07:00

Maltego

05:04

Wappalyzer addon

03:12

retire.js addon

04:39

Shodan addon

02:35

Knoxx addon

02:08

Hack-tools addon

05:04

WAF Identificaton

06:13

HostileSubBruteForcer

04:25

Sub404

03:28

Subjack

03:46

dirb

02:40

ffuf

07:14

Introduction to nmap

03:02

Port specification in nmap

03:48

Service and version detection from nmap

04:04

Firewall bypass technique

05:45

naabu

05:17

Masscan

05:15

Gowitness

08:22

Preview

01:49

Understanding the structure of url

02:46

Syntax of google dorking

01:50

Golden rules of google dorking

04:15

Google dorking operators

05:15

Google search operators ( Part - 1 )

09:16

Google search operators ( Part - 2 )

14:35

Introduction to practical google dorking

08:55

How to find directory listing vulnerabilities ?

02:46

How to dork for wordpress plugins and thems ?

03:45

How to dork for web servers versions ?

01:53

How to dork for application generated system reports ?

01:15

Dorking for SQLi

02:39

Preview

04:37

Tip #1

02:52

Tip #2

02:58

Tip #3

03:18

Preview

01:37

Shodan web interface

08:42

Shodan search filters

09:54

Finding servers

07:37


Finding fIles and directories

06:47

Finding operating systems

06:17

Finding compromised devices and websites

06:17

Introduction to shodan command line

06:17

Practical shodan in command line

08:52

Introduction to github dorking

08:52

Github dorking practical

12:22

Nuclei tool

10:25

WP-Scan

09:15

Scanning with burpsuite

04:59

DNS recon using metasploit

05:35

Sub-domain enumeration using metasploit

10:40

E-mail address finder

02:02

TCP SYN port scan using metasploit

03:28

SSH version detection

01:59

FTP version enumeration

01:59

MySQL version detection

01:59

HTTP enumeration

01:59

Payloads for bug hunters and penetration testers

00:05

XSS finding tool

06:49

URL extractor from javascript files

24:35

SSRF finder tool

17:22

Full website recon tool

41:19

Bonus video

01:59



Instructor

Vivek Pandit

Linux system administrator, bug bounty hunter,Ethical hacker

Vivek Pandit

4.5 Instructor Rating

76 Reviews

18,346 Students

3 Courses

My name is Vivek Pandit I belong to India. So, I am a professional bug bounty hunter, linux administrator, website designer and I am also a expert in bash scripting.  I belongs from India and I am very curious about shell scripting, ethical hacking, learning linux and technology. I am not perfect and no one is perfect.

This course includes:

9 hours on-demand video

1 article

13 downloadable resources

Full lifetime access

Access on mobile and TV

Certificate of completion

Audio description in existing audio


Coupon Code: 8E0184EE1ADB7C289193

Click Here To Apply

Comments

Popular posts from this blog

UI/UX Design With Figma : 5+ Real World Projects 2023 Course For Free With Certification | Free Udemy Course | First 1000 Users for Free |

Mastering Kali Linux for Ethical Hackers 2024 Course For Free With Certification | Free Udemy Course | First 1000 Users for Free |

57+ Paid Udemy Course For Free With Certificate | 2 June 2021 | Enroll As Soon As Possible