Description
What you’ll learn
-
Web Reconnaissance: Unlocking the Mysteries of Websites for Competitive Advantage
-
Beyond the Main Domain: Expert Tips for Discovering Subdomains
-
URL Mining: Advanced Techniques for Gathering Valuable Data and Insights
-
Parameter Discovery: Advanced Techniques for Uncovering Valuable Data
-
Information Mining: How to Unleash the Power of Data Through Smart Gathering
-
Unlocking the Power of Information: Safely Gathering Sensitive Data from Websites
-
Uncover the Hidden Truth: Mastering Deep Recon on Websites
Welcome to our Comprehensive Website Reconnaissance Course, meticulously crafted for bug bounty hunters, penetration testers, and ethical hackers. This course is designed for intermediate learners, offering an in-depth exploration of website reconnaissance techniques crucial for vulnerability assessment.
You will start by understanding the fundamentals of reconnaissance, emphasizing its significance in bug bounty hunting and penetration testing. From subdomain enumeration and URL extraction to parameter brute forcing and building custom reconnaissance tools, this course covers all essential aspects needed to enhance your skillset.
Our structured curriculum ensures a thorough understanding of website reconnaissance, guiding you step-by-step through proven methodologies used by professionals. The video content is organized into manageable segments to allow for self-paced learning, ensuring clarity at each stage.
In addition, you will have access to a rich resource section that includes links, PDFs, and payloads discussed throughout the course, offering you a comprehensive toolkit for mastering website reconnaissance.
Key Features:
-
Step-by-step methodologies for website recon, bug bounty hunting, and penetration testing.
-
Advanced techniques such as subdomain enumeration, URL discovery, parameter brute-forcing, and custom tool creation.
-
Hands-on learning with practical exercises, real-world examples, and automation tools.
-
Extensive resources including guides, payloads, and scripts for enhancing your recon efforts.
Course Curriculum Highlights:
-
Subdomain Enumeration & Bruteforcing
-
URL Extraction & Parameter Discovery
-
Google Dorking & Shodan Dorking
-
Visual Reconnaissance Techniques
-
Vulnerability Scanning with Nuclei, Burpsuite, and Metasploit
-
OSINT, DNS, and Port Scanning Tools
-
Custom Recon Tool Creation for SSRF, XSS, and more
Whether you’re looking to level up your bug bounty skills or become more proficient in website penetration testing, this course will provide the knowledge and tools you need to succeed.
Course Curriculum :
-
Introduction
-
Introduction to recon
-
-
Subdomain enumeration from tools
-
Subdomain enumeration #1
-
Subdomain enumeration #2
-
Subdomain enumeration #3
-
Subdomain enumeration #4
-
Subdomain bruteforcing
-
Filtering unique domains
-
Subdomain generator
-
-
Subdomain enumeration from websites
-
Subdomain enumeration from website #1
-
Subdomain enumeration from website #2
-
Subdomain enumeration from website #3
-
Subdomain enumeration from website #4
-
-
Filtering live domains
-
Filtering live domains
-
-
URL extraction from the internet
-
URL extraction from the internet #1
-
URL extraction from the internet #2
-
-
Finding parameters
-
Finding parameters
-
Parameter bruteforcer
-
-
Finding URL from past
-
URL from past
-
-
Sorting urls
-
Sorting url for vulnerabilities
-
-
Automation for replacing parameters with Payloads
-
Automation for replacing parameters with Payloads
-
-
Footprinting websites ( Website recon )
-
Whatweb recon
-
Netcraft
-
Security headers
-
Dnsdumpmaster
-
Whois recon
-
Mxtoolbox
-
OSINT
-
Maltego
-
-
Browser addons for recon
-
wappalyzer
-
retire.js
-
shodan
-
Knoxx
-
Hack-tools addon
-
-
WAF idetification
-
WAF identification
-
-
Subdomain takeover
-
HostileSubBruteForcer
-
Sub404
-
Subjack
-
-
Fuzzing (Content-Discovery)
-
dirb
-
ffuf
-
-
Port scanning
-
Introduction to nmap
-
Port specification in nmap
-
Service and version detection from nmap
-
Firewall bypass technique
-
-
Fast port scanning
-
nabbu
-
masscan
-
-
Visual recon
-
Gowitness
-
-
Google dorking
-
Introduction to google dorking
-
Understnding the URLÂ structure
-
Syntax of google dorking
-
Google dorking operators
-
Google search operators ( Part – 1 )
-
Google search operators ( Part – 2 )
-
-
Google dorking practical
-
Introduction to practical google dorking
-
How to find directory listing vulnerabilities ?
-
How to dork for wordpress plugins and thems ?
-
How to dork for web servers versions ?
-
How to dork for application generated system reports ?
-
Dorking for SQLi
-
Reading materials for google dorking
-
-
Tips for advance google dorking
-
Tip #1
-
Tip #2
-
Tip #3
-
-
Shodan dorking
-
Intro to shodan dorking
-
Shodan web interface
-
Shodan search filters
-
-
Shodan dorking practical
-
Finding server
-
Finding fIles and directories
-
Finding operating systems
-
Finding compromised devices and websites
-
-
Shodan command line
-
Introduction to shodan command line
-
Practical shodan in command line
-
-
Github dorking
-
Introduction to github dorking
-
Github dorking practical
-
-
Vulnerability scanning
-
Nuclei
-
Wp-Scan
-
Scanning with burpsuite
-
-
Metasploit for recon
-
DNS recon using metasploit
-
Sub-domain enumeration using metasploit
-
E-mail address finding
-
-
Port scanning using metasploit
-
TCP SYN port scan using metasploit
-
SSH version detection
-
FTP version enumeration
-
MySQL version detection
-
HTTP enumeration
-
-
Payloads for bug bounty hunters
-
Payloads for bug hunters and enetration testers
-
-
How to create tools for recon ?
-
SSRF finder tool
-
XSS finding too
-
URL extractor from javascript files
-
Full website recon tool
-
-
Bonus
-
Bonus video
-
Thank you 🙂
Vivek Pandit
Who this course is for:
- Bug bounty hunters, penetration testers, ethical hackers and etc.
Reviews
There are no reviews yet.