What's new
Warez.Ge

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Recon for bug bounty, penetration testers & ethical hackers | Udemy

tut4it

Active member
ec6wYNb.png
Recon for bug bounty, penetration testers & ethical hackers | Udemy
English | Size: 5.07 GB
Genre: eLearning​

Recon for bug bounty, penetration testers & ethical hackers. Full methodology of website reconnaissance and bug bounty.

What you'll learn
Recon on websites
Gathering subdomains
Gathering urls
Gathering parameters
Informtion gathering
Gathering sensetive data from websites
Deep recon on website

This course is fully made for website reconnaissance for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.

Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more...

This course is fully focused on website recon and vulnerability assessment.

There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.

All the resources are provided in the resource section including links, pdf, payloads that are used in course.

Course Curriculum :

Introduction

Introduction to recon

Subdomain enumeration from tools

Subdomain enumeration #1

Subdomain enumeration #2

Subdomain enumeration #3

Subdomain enumeration #4

Subdomain bruteforcing

Filtering unique domains

Subdomain generator

Subdomain enumeration from websites

Subdomain enumeration from website #1

Subdomain enumeration from website #2

Subdomain enumeration from website #3

Subdomain enumeration from website #4

Filtering live domains

Filtering live domains

URL extraction from the internet

URL extraction from the internet #1

URL extraction from the internet #2

Finding parameters

Finding parameters

Parameter bruteforcer

Finding URL from past

URL from past

Sorting urls

Sorting url for vulnerabilities

Automation for replacing parameters with Payloads

Automation for replacing parameters with Payloads

Footprinting websites ( Website recon )

Whatweb recon

Netcraft

Security headers

Dnsdumpmaster

Whois recon

Mxtoolbox

OSINT

Maltego

Browser addons for recon

wappalyzer

retire.js

shodan

Knoxx

Hack-tools addon

WAF idetification

WAF identification

Subdomain takeover

HostileSubBruteForcer

Sub404

Subjack

Fuzzing (Content-Discovery)

dirb

ffuf

Port scanning

Introduction to nmap

Port specification in nmap

Service and version detection from nmap

Firewall bypass technique

Fast port scanning

nabbu

masscan

Visual recon

Gowitness

Google dorking

Introduction to google dorking

Understnding the URL structure

Syntax of google dorking

Google dorking operators

Google search operators ( Part - 1 )

Google search operators ( Part - 2 )

Google dorking practical

Introduction to practical google dorking

How to find directory listing vulnerabilities ?

How to dork for wordpress plugins and thems ?

How to dork for web servers versions ?

How to dork for application generated system reports ?

Dorking for SQLi

Reading materials for google dorking

Tips for advance google dorking

Tip #1

Tip #2

Tip #3

Shodan dorking

Intro to shodan dorking

Shodan web interface

Shodan search filters

Shodan dorking practical

Finding server

Finding fIles and directories

Finding operating systems

Finding compromised devices and websites

Shodan command line

Introduction to shodan command line

Practical shodan in command line

Github dorking

Introduction to github dorking

Github dorking practical

Vulnerability scanning

Nuclei

Wp-Scan

Scanning with burpsuite

Metasploit for recon

DNS recon using metasploit

Sub-domain enumeration using metasploit

E-mail address finding

Port scanning using metasploit

TCP SYN port scan using metasploit

SSH version detection

FTP version enumeration

MySQL version detection

HTTP enumeration

Payloads for bug bounty hunters

Payloads for bug hunters and enetration testers

How to create tools for recon ?

SSRF finder tool

XSS finding too

URL extractor from javascript files

Full website recon tool

Bonus

Bonus video

Thank you :)

Vivek Pandit

Who this course is for:
Bug bounty hunters, penetration testers, ethical hackers and etc.

yMNlxlr.png

DnAn0tn.png

Code:
https://nitroflare.com/view/69D5D46697AE8A6/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part1.rar
https://nitroflare.com/view/3BF9B8E20D1F5FA/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part2.rar
https://nitroflare.com/view/09DD6809008F55D/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part3.rar
https://nitroflare.com/view/8E4F2D351DEB8B7/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part4.rar
https://nitroflare.com/view/6EDB78A08A6F3B5/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part5.rar
https://nitroflare.com/view/E66E835F84C7766/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part6.rar
lzLY3aA.png

Code:
https://rapidgator.net/file/ca6140bf854ab994c923ba4cef7f3dbf/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part1.rar.html
https://rapidgator.net/file/805ab2aeba030b2e6f42256ee09f9a3f/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part2.rar.html
https://rapidgator.net/file/db3e2f3d6e35780e066330ddb412eda1/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part3.rar.html
https://rapidgator.net/file/949f8182e26f636cb297f2b74a6b8e74/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part4.rar.html
https://rapidgator.net/file/1e6ed8bceb6ad802f144568a06d71be1/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part5.rar.html
https://rapidgator.net/file/379c97e79ef263f7eed9a59d0b85fd2d/UD-Recon-for-bug-bounty-penetration-testers-ethical-hackers.part6.rar.html
If any links die or problem unrar, send request to
Code:
https://forms.gle/e557HbjJ5vatekDV9
 

Users who are viewing this thread

Back
Top