Mastering Reconnaissance for Ethical Hacking, Bug Bounty Hunting, and Penetration Testing: A Comprehensive Course

Categories: Bug Bounty
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

This course is fully made for website reconnaissance  for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.

Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more…

This course is fully focused on website recon and vulnerability assessment.

There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.

All the resources are provided in the resource section including links, pdf, payloads that are used in course.

Course Curriculum :

  1. Introduction
  2. Subdomain enumeration from tools
  3. Subdomain enumeration from websites
  4. Filtering live domains
  5. URL extraction from the internet
  6. Finding parameters
  7. Finding URL from past
  8. Sorting urls
  9. Automation for replacing parameters with Payloads
  10. Footprinting websites ( Website recon )
  11. Browser addons for recon
  12. WAF idetification
  13. Subdomain takeover
  14. Fuzzing (Content-Discovery)
  15. Port scanning
  16. Fast port scanning
  17. Visual recon
  18. Google dorking
  19. Google dorking practical
  20. Tips for advance google dorking
  21. Shodan dorking
  22. Shodan dorking practical
  23. Shodan command line
  24. Github dorking
  25. Vulnerability scanning
  26. Metasploit for recon
  27. Port scanning using metasploit
  28. Payloads for bug bounty hunters
  29. How to create tools for recon ?
  30. Bonus

Thank you 🙂

Vivek Pandit

Show More

What Will You Learn?

  • Web Reconnaissance: Unlocking the Mysteries of Websites for Competitive Advantage.
  • Beyond the Main Domain: Expert Tips for Discovering Subdomains.
  • URL Mining: Advanced Techniques for Gathering Valuable Data and Insights.
  • Information Mining: How to Unleash the Power of Data Through Smart Gathering.
  • Unlocking the Power of Information: Safely Gathering Sensitive Data from Websites.
  • Uncover the Hidden Truth: Mastering Deep Recon on Websites.
  • Beyond the Main Domain: Expert Tips for Discovering Subdomains.
  • Web Reconnaissance: Unlocking the Mysteries of Websites for Competitive Advantage.

Course Content

1. Introduction

  • Introduction to recon
    05:43

2. Subdomain enumeration from tools

3. Subdomain enumeration from websites

4. Filtering live Sub-domains

5. URL extraction from the internet

6. Finding parameters

7. Finding URL from past

8. Sorting urls

9. Automation for replacing parameters with Payloads

10. Footprinting websites ( Website recon )

11. Browser addons for recon

12. WAF idetification

13. Subdomain takeover

14. Fuzzing (Content-Discovery)

15. Port scanning

16. Fast port scanning

17. Visual recon

18. Google dorking

19. Google dorking practical

20. Tips for advance google dorking

21. Shodan dorking

22. Shodan dorking Practical

23. Shodan command line

24. Github dorking

25. Vulnerability scanning

26. Metasploit for recon

27. Port scanning using metasploit

28. Payloads for bug bounty hunters

29. How to create tools for recon ?

30. Bonus

Student Ratings & Reviews

No Review Yet
No Review Yet
Shopping Cart
Scroll to Top
www.thecyberblogs.com