Mastering Reconnaissance for Ethical Hacking, Bug Bounty Hunting, and Penetration Testing: A Comprehensive Course
About Course
This course is fully made for website reconnaissance for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.
Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more…
This course is fully focused on website recon and vulnerability assessment.
There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.
All the resources are provided in the resource section including links, pdf, payloads that are used in course.
Course Curriculum :
- Introduction
- Subdomain enumeration from tools
- Subdomain enumeration from websites
- Filtering live domains
- URL extraction from the internet
- Finding parameters
- Finding URL from past
- Sorting urls
- Automation for replacing parameters with Payloads
- Footprinting websites ( Website recon )
- Browser addons for recon
- WAF idetification
- Subdomain takeover
- Fuzzing (Content-Discovery)
- Port scanning
- Fast port scanning
- Visual recon
- Google dorking
- Google dorking practical
- Tips for advance google dorking
- Shodan dorking
- Shodan dorking practical
- Shodan command line
- Github dorking
- Vulnerability scanning
- Metasploit for recon
- Port scanning using metasploit
- Payloads for bug bounty hunters
- How to create tools for recon ?
- Bonus
Thank you 🙂
Vivek Pandit
Course Content
1. Introduction
-
Introduction to recon
05:43