Recon For Bug Bounty, Penetration Testers & Ethical Hackers

Maximize your bug bounty hunting with expert-led recon course. Info gathering, tools & techniques covered.

4.08 (145 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
Recon For Bug Bounty, Penetration Testers & Ethical Hackers
20,657
students
9 hours
content
Aug 2023
last update
$64.99
regular price

What you will learn

Web Reconnaissance: Unlocking the Mysteries of Websites for Competitive Advantage

Beyond the Main Domain: Expert Tips for Discovering Subdomains

URL Mining: Advanced Techniques for Gathering Valuable Data and Insights

Parameter Discovery: Advanced Techniques for Uncovering Valuable Data

Information Mining: How to Unleash the Power of Data Through Smart Gathering

Unlocking the Power of Information: Safely Gathering Sensitive Data from Websites

Uncover the Hidden Truth: Mastering Deep Recon on Websites

Why take this course?

This course is fully made for website reconnaissance  for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.

Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more...

This course is fully focused on website recon and vulnerability assessment.

There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.

All the resources are provided in the resource section including links, pdf, payloads that are used in course.


Course Curriculum :

  1. Introduction

    1. Introduction to recon

  2. Subdomain enumeration from tools

    1. Subdomain enumeration #1

    2. Subdomain enumeration #2

    3. Subdomain enumeration #3

    4. Subdomain enumeration #4

    5. Subdomain bruteforcing

    6. Filtering unique domains

    7. Subdomain generator

  3. Subdomain enumeration from websites

    1. Subdomain enumeration from website #1

    2. Subdomain enumeration from website #2

    3. Subdomain enumeration from website #3

    4. Subdomain enumeration from website #4

  4. Filtering live domains

    1. Filtering live domains

  5. URL extraction from the internet

    1. URL extraction from the internet #1

    2. URL extraction from the internet #2

  6. Finding parameters

    1. Finding parameters

    2. Parameter bruteforcer

  7. Finding URL from past

    1. URL from past

  8. Sorting urls

    1. Sorting url for vulnerabilities

  9. Automation for replacing parameters with Payloads

    1. Automation for replacing parameters with Payloads

  10. Footprinting websites ( Website recon )

    1. Whatweb recon

    2. Netcraft

    3. Security headers

    4. Dnsdumpmaster

    5. Whois recon

    6. Mxtoolbox

    7. OSINT

    8. Maltego

  11. Browser addons for recon

    1. wappalyzer

    2. retire.js

    3. shodan

    4. Knoxx

    5. Hack-tools addon

  12. WAF idetification

    1. WAF identification

  13. Subdomain takeover

    1. HostileSubBruteForcer

    2. Sub404

    3. Subjack

  14. Fuzzing (Content-Discovery)

    1. dirb

    2. ffuf

  15. Port scanning

    1. Introduction to nmap

    2. Port specification in nmap

    3. Service and version detection from nmap

    4. Firewall bypass technique

  16. Fast port scanning

    1. nabbu

    2. masscan

  17. Visual recon

    1. Gowitness

  18. Google dorking

    1. Introduction to google dorking

    2. Understnding the URL structure

    3. Syntax of google dorking

    4. Google dorking operators

    5. Google search operators ( Part - 1 )

    6. Google search operators ( Part - 2 )

  19. Google dorking practical

    1. Introduction to practical google dorking

    2. How to find directory listing vulnerabilities ?

    3. How to dork for wordpress plugins and thems ?

    4. How to dork for web servers versions ?

    5. How to dork for application generated system reports ?

    6. Dorking for SQLi

    7. Reading materials for google dorking

  20. Tips for advance google dorking

    1. Tip #1

    2. Tip #2

    3. Tip #3

  21. Shodan dorking

    1. Intro to shodan dorking

    2. Shodan web interface

    3. Shodan search filters

  22. Shodan dorking practical

    1. Finding server

    2. Finding fIles and directories

    3. Finding operating systems

    4. Finding compromised devices and websites

  23. Shodan command line

    1. Introduction to shodan command line

    2. Practical shodan in command line

  24. Github dorking

    1. Introduction to github dorking

    2. Github dorking practical

  25. Vulnerability scanning

    1. Nuclei

    2. Wp-Scan

    3. Scanning with burpsuite

  26. Metasploit for recon

    1. DNS recon using metasploit

    2. Sub-domain enumeration using metasploit

    3. E-mail address finding

  27. Port scanning using metasploit

    1. TCP SYN port scan using metasploit

    2. SSH version detection

    3. FTP version enumeration

    4. MySQL version detection

    5. HTTP enumeration

  28. Payloads for bug bounty hunters

    1. Payloads for bug hunters and enetration testers

  29. How to create tools for recon ?

    1. SSRF finder tool

    2. XSS finding too

    3. URL extractor from javascript files

    4. Full website recon tool

  30. Bonus

    1. Bonus video

Thank you :)

Vivek Pandit


Screenshots

Recon For Bug Bounty, Penetration Testers & Ethical Hackers - Screenshot_01Recon For Bug Bounty, Penetration Testers & Ethical Hackers - Screenshot_02Recon For Bug Bounty, Penetration Testers & Ethical Hackers - Screenshot_03Recon For Bug Bounty, Penetration Testers & Ethical Hackers - Screenshot_04

Reviews

Shaheryar
July 13, 2023
I have never ever seen this type of Hacking Course It Teaches all the things about pentesting i love it
Charles
May 26, 2023
The author does a thorough job of covering various free tools for penetration testing. The breadth of tools is impressive. I was looking for more coverage of the "so what". As an IT professional, I know how to install tools (which he spends a lot of time covering). The author has claimed 500 bounties so I would have been interested in practicums like "here's the process/workflow I used to discover and claim a bounty from this company on their open MySQL db page. I started by ... and then used tools X, Y, and Z to do...." Several videos should have been re-recorded when he ran into problems like dead tool web sites (waste your time, not mine) and the videos had differing levels of volume. The last two criticisms are not crucial, but show a level of care and polish.
SYED
April 28, 2023
Very informative & very important course for bug hunting as RECON is very important phase for making perfect bug bounty!!Great effort by Vievek sir in making this course. THANK-YOU.
Chaithanya
February 19, 2023
Course is nice. If you want to start basics, this would be the first course to do. Please bring more courses on remaining topics.

Charts

Price

Recon For Bug Bounty, Penetration Testers & Ethical Hackers - Price chart

Rating

Recon For Bug Bounty, Penetration Testers & Ethical Hackers - Ratings chart

Enrollment distribution

Recon For Bug Bounty, Penetration Testers & Ethical Hackers - Distribution chart

Related Topics

5037152
udemy ID
12/22/2022
course created date
1/6/2023
course indexed date
Bot
course submited by