Companies Home Search Profile

Recon For Bug Bounty, Penetration Testers & Ethical Hackers

Focused View

Vivek Pandit

9:13:58

88 View
  • 1. Introduction of recon.mp4
    05:43
  • 1. Subdomain enumeration #1.mp4
    09:17
  • 2. Subdomain enumeration #2.mp4
    06:27
  • 3. Subdomain enumeration #3.mp4
    06:16
  • 4. Subdomain enumeration #4.mp4
    03:42
  • 5. Subdomain bruteforcing tools.mp4
    05:42
  • 6. Filtering unique domains.mp4
    03:20
  • 7.1 Section - 2 ( Resource ).pdf
  • 7. Subdomain generator.mp4
    08:26
  • 1. Subdomain enumeration from website #1.mp4
    03:02
  • 2. Subdomain enumeration from website #2.mp4
    06:19
  • 3. Subdomain enumeration from website #3.mp4
    03:32
  • 4.1 Section - 3 ( Resource ).pdf
  • 4. Subdomain enumeration from website #4.mp4
    03:58
  • 1. Filtering live domains.mp4
    16:15
  • 1. URL extraction from the internet #1.mp4
    09:14
  • 2. URL extraction from the internet #2.mp4
    08:09
  • 1. Finding parameters.mp4
    03:14
  • 2. Parameter bruteforcer.mp4
    04:46
  • 1. URL from past.mp4
    04:32
  • 1. Sorting url for vulnerabilities.mp4
    11:07
  • 1. Automation for replacing parameters with Payloads.mp4
    04:58
  • 1. Wahtweb scanner.mp4
    09:16
  • 2. Netcraft.mp4
    04:45
  • 3. Security headers.mp4
    02:48
  • 4. Dnsdumpmaster.mp4
    04:09
  • 5. Whois recon.mp4
    04:16
  • 6. Mxtoolbox.mp4
    03:02
  • 7. OSINT.mp4
    07:00
  • 8.1 Document 7.pdf
  • 8. Maltego.mp4
    05:04
  • 1. Wappalyzer addon.mp4
    03:12
  • 2. retire.js addon.mp4
    04:39
  • 3. Shodan addon.mp4
    02:35
  • 4. Knoxx addon.mp4
    02:08
  • 5.1 Section - 11 ( Resource ).pdf
  • 5. Hack-tools addon.mp4
    05:04
  • 1. WAF Identificaton.mp4
    06:13
  • 1. HostileSubBruteForcer.mp4
    04:25
  • 2. Sub404.mp4
    03:28
  • 3. Subjack.mp4
    03:46
  • 1. Automation for replacing parameters with Payloads.html
  • 2. dirb.mp4
    02:40
  • 3. ffuf.mp4
    07:14
  • 1. Introduction to nmap.mp4
    03:02
  • 2. Port specification in nmap.mp4
    03:48
  • 3. Service and version detection from nmap.mp4
    04:04
  • 4.1 Section - 15 ( Resource ).pdf
  • 4. Firewall bypass technique.mp4
    05:45
  • 1. naabu.mp4
    05:17
  • 2. Masscan.mp4
    05:15
  • 1. Gowitness.mp4
    08:22
  • 1. Introduction to google dorking.mp4
    01:49
  • 2. Understanding the structure of url.mp4
    02:46
  • 3. Syntax of google dorking.mp4
    01:50
  • 4. Golden rules of google dorking.mp4
    04:15
  • 5. Google dorking operators.mp4
    05:15
  • 6. Google search operators ( Part - 1 ).mp4
    09:16
  • 7.1 Section - 18 ( Resource )-2.pdf
  • 7.2 Section - 18 ( Resource ).pdf
  • 7. Google search operators ( Part - 2 ).mp4
    14:35
  • 1. Introduction to practical google dorking.mp4
    08:55
  • 2. How to find directory listing vulnerabilities .mp4
    02:46
  • 3. How to dork for wordpress plugins and thems .mp4
    03:45
  • 4. How to dork for web servers versions .mp4
    01:53
  • 5. How to dork for application generated system reports .mp4
    01:15
  • 6. Dorking for SQLi.mp4
    02:39
  • 7.1 Section - 18 ( Resource )-2.pdf
  • 7. Reading materials for google dorking.mp4
    04:37
  • 1. Tip #1.mp4
    02:52
  • 2. Tip #2.mp4
    02:58
  • 3. Tip #3.mp4
    03:18
  • 1. Introduction to shodan dorking.mp4
    01:37
  • 2. Shodan web interface.mp4
    08:42
  • 3.1 List of shodan general filters.pdf
  • 3.2 List of shodan search facets.pdf
  • 3.3 Section - 21 ( Resource ).pdf
  • 3. Shodan search filters.mp4
    09:54
  • 4. Resource.html
  • 1. Finding servers.mp4
    07:37
  • 2. Finding fIles and directories.mp4
    06:47
  • 3. Finding operating systems.mp4
    06:17
  • 4. Finding compromised devices and websites.mp4
    06:17
  • 1. Introduction to shodan command line.mp4
    06:17
  • 2. Practical shodan in command line.mp4
    08:52
  • 1. Introduction to github dorking.mp4
    08:52
  • 2.1 github.dorking.pdf
  • 2. Github dorking practical.mp4
    12:22
  • 1. Nuclei tool.mp4
    10:25
  • 2. WP-Scan.mp4
    09:15
  • 3. List of shodan search filters.html
  • 4. Scanning with burpsuite.mp4
    04:59
  • 1. DNS recon using metasploit.mp4
    05:35
  • 2. Sub-domain enumeration using metasploit.mp4
    10:40
  • 3. E-mail address finder.mp4
    02:02
  • 1. TCP SYN port scan using metasploit.mp4
    03:28
  • 2. SSH version detection.mp4
    01:59
  • 3. FTP version enumeration.mp4
    01:59
  • 4. MySQL version detection.mp4
    01:59
  • 5. HTTP enumeration.mp4
    01:59
  • 1.1 My personal payload collection.rar
  • 1. Payloads for bug hunters and penetration testers.html
  • 1. XSS finding tool.mp4
    06:49
  • 2. URL extractor from javascript files.mp4
    24:35
  • 3. SSRF finder tool.mp4
    17:22
  • 4. Full website recon tool.mp4
    41:19
  • 1. Bonus video.mp4
    01:59
  • Description


    Maximize your bug bounty hunting with expert-led recon course. Info gathering, tools & techniques covered.

    What You'll Learn?


    • Web Reconnaissance: Unlocking the Mysteries of Websites for Competitive Advantage
    • Beyond the Main Domain: Expert Tips for Discovering Subdomains
    • URL Mining: Advanced Techniques for Gathering Valuable Data and Insights
    • Parameter Discovery: Advanced Techniques for Uncovering Valuable Data
    • Information Mining: How to Unleash the Power of Data Through Smart Gathering
    • Unlocking the Power of Information: Safely Gathering Sensitive Data from Websites
    • Uncover the Hidden Truth: Mastering Deep Recon on Websites

    Who is this for?


  • Bug bounty hunters, penetration testers, ethical hackers and etc.
  • More details


    Description

    This course is fully made for website reconnaissance  for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.

    Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more...

    This course is fully focused on website recon and vulnerability assessment.

    There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.

    All the resources are provided in the resource section including links, pdf, payloads that are used in course.


    Course Curriculum :

    1. Introduction

      1. Introduction to recon

    2. Subdomain enumeration from tools

      1. Subdomain enumeration #1

      2. Subdomain enumeration #2

      3. Subdomain enumeration #3

      4. Subdomain enumeration #4

      5. Subdomain bruteforcing

      6. Filtering unique domains

      7. Subdomain generator

    3. Subdomain enumeration from websites

      1. Subdomain enumeration from website #1

      2. Subdomain enumeration from website #2

      3. Subdomain enumeration from website #3

      4. Subdomain enumeration from website #4

    4. Filtering live domains

      1. Filtering live domains

    5. URL extraction from the internet

      1. URL extraction from the internet #1

      2. URL extraction from the internet #2

    6. Finding parameters

      1. Finding parameters

      2. Parameter bruteforcer

    7. Finding URL from past

      1. URL from past

    8. Sorting urls

      1. Sorting url for vulnerabilities

    9. Automation for replacing parameters with Payloads

      1. Automation for replacing parameters with Payloads

    10. Footprinting websites ( Website recon )

      1. Whatweb recon

      2. Netcraft

      3. Security headers

      4. Dnsdumpmaster

      5. Whois recon

      6. Mxtoolbox

      7. OSINT

      8. Maltego

    11. Browser addons for recon

      1. wappalyzer

      2. retire.js

      3. shodan

      4. Knoxx

      5. Hack-tools addon

    12. WAF idetification

      1. WAF identification

    13. Subdomain takeover

      1. HostileSubBruteForcer

      2. Sub404

      3. Subjack

    14. Fuzzing (Content-Discovery)

      1. dirb

      2. ffuf

    15. Port scanning

      1. Introduction to nmap

      2. Port specification in nmap

      3. Service and version detection from nmap

      4. Firewall bypass technique

    16. Fast port scanning

      1. nabbu

      2. masscan

    17. Visual recon

      1. Gowitness

    18. Google dorking

      1. Introduction to google dorking

      2. Understnding the URL structure

      3. Syntax of google dorking

      4. Google dorking operators

      5. Google search operators ( Part - 1 )

      6. Google search operators ( Part - 2 )

    19. Google dorking practical

      1. Introduction to practical google dorking

      2. How to find directory listing vulnerabilities ?

      3. How to dork for wordpress plugins and thems ?

      4. How to dork for web servers versions ?

      5. How to dork for application generated system reports ?

      6. Dorking for SQLi

      7. Reading materials for google dorking

    20. Tips for advance google dorking

      1. Tip #1

      2. Tip #2

      3. Tip #3

    21. Shodan dorking

      1. Intro to shodan dorking

      2. Shodan web interface

      3. Shodan search filters

    22. Shodan dorking practical

      1. Finding server

      2. Finding fIles and directories

      3. Finding operating systems

      4. Finding compromised devices and websites

    23. Shodan command line

      1. Introduction to shodan command line

      2. Practical shodan in command line

    24. Github dorking

      1. Introduction to github dorking

      2. Github dorking practical

    25. Vulnerability scanning

      1. Nuclei

      2. Wp-Scan

      3. Scanning with burpsuite

    26. Metasploit for recon

      1. DNS recon using metasploit

      2. Sub-domain enumeration using metasploit

      3. E-mail address finding

    27. Port scanning using metasploit

      1. TCP SYN port scan using metasploit

      2. SSH version detection

      3. FTP version enumeration

      4. MySQL version detection

      5. HTTP enumeration

    28. Payloads for bug bounty hunters

      1. Payloads for bug hunters and enetration testers

    29. How to create tools for recon ?

      1. SSRF finder tool

      2. XSS finding too

      3. URL extractor from javascript files

      4. Full website recon tool

    30. Bonus

      1. Bonus video

    Thank you :)

    Vivek Pandit


    Who this course is for:

    • Bug bounty hunters, penetration testers, ethical hackers and etc.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Vivek Pandit
    Vivek Pandit
    Instructor's Courses
    That's great to hear that Vivek Pandit is a successful ethical hacker who is providing his services to both government and private sectors in India. It's also impressive that he holds certifications like OSCP, CEH, and CISSP which are highly respected in the information security industry.Furthermore, training more than 25000 students worldwide is a significant achievement and demonstrates his dedication to sharing his knowledge and expertise with others. It's important to have skilled professionals in the field of ethical hacking to help protect organizations from cyber threats and vulnerabilities.Overall, it's encouraging to see individuals like Vivek Pandit making a positive impact in the cybersecurity industry, and I wish him continued success in his career.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 90
    • duration 9:13:58
    • Release Date 2023/05/17