Companies Home Search Profile

Creating a Shodan Clone for hackers and bug bounty hunters

Focused View

Ismail cenk

7:04:34

17 View
  • 1. Introduction.mp4
    00:43
  • 2. Install WSL 2 and VS code.mp4
    06:11
  • 3. Python Installation.mp4
    03:11
  • 4. masscan Installation.mp4
    08:17
  • 1.1 understandingthreads.pdf
  • 1. Understanding Threads.mp4
    05:47
  • 2.1 createfiles.zip
  • 2. Create Files.mp4
    17:18
  • 3. selecting subnets of your targets.mp4
    11:44
  • 4. Setting up a VPN before scan starts.mp4
    03:58
  • 1.1 extractingipsfromsubnet.zip
  • 1. Extracting IPs from subnet.mp4
    25:00
  • 2.1 getssl.zip
  • 2. Get SSL.mp4
    59:24
  • 3.1 preparingrequestsformultipleprotocolsandlimitingthem.zip
  • 3. Preparing Requests for multiple protocols and limiting them.mp4
    39:57
  • 4.1 scanner.zip
  • 4. Finishing the scanner.mp4
    01:18:56
  • 1.1 server.zip
  • 1. Creating the Database and testing the scanner.mp4
    49:35
  • 2.1 server.zip
  • 2. Finishing the backend.mp4
    01:43:40
  • 3. Running the backend for production.mp4
    10:53
  • Description


    Build Your Own Shodan-Style Network Search Engine, great for hackers, bug bounty hunters, red/ blue team members.

    What You'll Learn?


    • How to find IPs behind WAF.
    • How to scan millions of IP addresses super fast.
    • Find new subdomains
    • Make money by finding vulnerabilities.
    • Increase your attack surface
    • Find vulnerable endpoints
    • Find specific frameworks to attack
    • Improve coding in Python programming language.

    Who is this for?


  • Hackers
  • Penetration testers
  • Bug bounty hunters
  • Red team members
  • Blue team members
  • Students who want to get into Cybersecurity
  • Network engineers
  • What You Need to Know?


  • Beginner Python knowledge is required.
  • A PC / Laptop running Linux or Windows OS
  • More details


    Description

    Unlock the advanced techniques of network scanning and broaden your penetration testing capabilities with this comprehensive course. Designed for aspiring ethical hackers and security enthusiasts, this course delves deep into the art of efficiently scanning millions of IP addresses and expanding the potential attack surface.


    The scanner we will create is much more effective than Shodan/ Censys or any similar search engine, because it can also find many IPs, subdomains, frameworks of small companies. I ain't playing games here, this is not an average YouTube course or a simple course or a useless hacking certification course. This is a whole hacking massacre.


    Basic Python knowledge is required. Please make sure that you have basic/beginner python knowledge as it may get very hard to understand the course.  DO NOT copy and paste the code, if you don't watch ALL  the course videos and just use the app I create you will fail. Understand the entire course, you can then do amazing things.


    Mastering Network Scanning Techniques: Learn the ins and outs of various network scanning methodologies, including port scanning, host discovery, to gain a comprehensive view of your target network.


    Efficient IP Address Enumeration: Acquire the skills to efficiently enumerate large sets of IP addresses, identifying potential entry points for penetration testing and vulnerability assessment.


    Service Identification and Versioning: Hone your skills in identifying running services and their versions, enabling you to pinpoint specific vulnerabilities and potential avenues for exploitation.


    Who Should Enroll:

    • Cybersecurity Enthusiasts

    • Ethical Hackers and Penetration Testers

    • Bug Bounty Hunters

    • IT Professionals Seeking Advanced Security Skills

    • Network Administrators Interested in Security

    • Students Pursuing a Career in Cybersecurity

    • Red team / Blue team members

    Embark on a transformative journey to elevate your network scanning proficiency. By enrolling in this course, you'll gain exclusive access to advanced techniques that will revolutionize your approach to security assessments. Discover the nuanced art of efficient IP address enumeration and master the strategic expansion of the attack surface. These skills are pivotal for conducting highly effective penetration tests and in-depth vulnerability assessments.


    Prepare to take your network scanning skills to the next level. Enroll now and unlock the secrets to efficient IP address enumeration for effective penetration testing and vulnerability assessment.

    Who this course is for:

    • Hackers
    • Penetration testers
    • Bug bounty hunters
    • Red team members
    • Blue team members
    • Students who want to get into Cybersecurity
    • Network engineers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Hi,My name  is Ismail. I have created hundreds of web and mobile applications and worked for multiple companies for the last 20 years and hacked many systems(legally) doing black box testing. I want others to benefit from my knowledge, especially the newcomers to the IT industry. My teaching method is very unique, focusing on the current trend, what the job market requires you to know. This is extremely important, because you may be a good coder but can still fail that interview pretty easily. Failure is not an option and I am here to help you succeed.All the Best
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 15
    • duration 7:04:34
    • Release Date 2023/12/16