Recon For Bug Bounty, Penetration Testers &Amp; Ethical Hackers

Torrent Details


Recon for bug bounty, penetration testers & ethical hackers

NAME
Recon for bug bounty, penetration testers & ethical hackers.torrent
CATEGORY
Other
INFOHASH
48a9e0f086d7cdcc4083fde1af9e4ac5fff07059
SIZE
5.1 GB in 98 files
ADDED
Uploaded on 22-01-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Description

This course is fully made for website reconnaissance for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.

Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more…

This course is fully focused on website recon and vulnerability assessment.

There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.

All the resources are provided in the resource section including links, pdf, payloads that are used in course.

Course Curriculum :

Introduction
Introduction to recon
Subdomain enumeration from tools
Subdomain enumeration #1
Subdomain enumeration #2
Subdomain enumeration #3
Subdomain enumeration #4
Subdomain bruteforcing
Filtering unique domains
Subdomain generator
Subdomain enumeration from websites
Subdomain enumeration from website #1
Subdomain enumeration from website #2
Subdomain enumeration from website #3
Subdomain enumeration from website #4
Filtering live domains
Filtering live domains
URL extraction from the internet
URL extraction from the internet #1
URL extraction from the internet #2
Finding parameters
Finding parameters
Parameter bruteforcer
Finding URL from past
URL from past
Sorting urls
Sorting url for vulnerabilities
Automation for replacing parameters with Payloads
Automation for replacing parameters with Payloads
Footprinting websites ( Website recon )
Whatweb recon
Netcraft
Security headers
Dnsdumpmaster
Whois recon
Mxtoolbox
OSINT
Maltego
Browser addons for recon
wappalyzer
retire.js
shodan
Knoxx
Hack-tools addon
WAF idetification
WAF identification
Subdomain takeover
HostileSubBruteForcer
Sub404
Subjack
Fuzzing (Content-Discovery)
dirb
ffuf
Port scanning
Introduction to nmap
Port specification in nmap
Service and version detection from nmap
Firewall bypass technique
Fast port scanning
nabbu
masscan
Visual recon
Gowitness
Google dorking
Introduction to google dorking
Understnding the URL structure
Syntax of google dorking
Google dorking operators
Google search operators ( Part – 1 )
Google search operators ( Part – 2 )
Google dorking practical
Introduction to practical google dorking
How to find directory listing vulnerabilities ?
How to dork for wordpress plugins and thems ?
How to dork for web servers versions ?
How to dork for application generated system reports ?
Dorking for SQLi
Reading materials for google dorking
Tips for advance google dorking
Tip #1
Tip #2
Tip #3
Shodan dorking
Intro to shodan dorking
Shodan web interface
Shodan search filters
Shodan dorking practical
Finding server
Finding fIles and directories
Finding operating systems
Finding compromised devices and websites
Shodan command line
Introduction to shodan command line
Practical shodan in command line
Github dorking
Introduction to github dorking
Github dorking practical
Vulnerability scanning
Nuclei
Wp-Scan
Scanning with burpsuite
Metasploit for recon
DNS recon using metasploit
Sub-domain enumeration using metasploit
E-mail address finding
Port scanning using metasploit
TCP SYN port scan using metasploit
SSH version detection
FTP version enumeration
MySQL version detection
HTTP enumeration
Payloads for bug bounty hunters
Payloads for bug hunters and enetration testers
How to create tools for recon ?
SSRF finder tool
XSS finding too
URL extractor from javascript files
Full website recon tool
Bonus
Bonus video

Thank you

Vivek Pandit
Who this course is for:

Bug bounty hunters, penetration testers, ethical hackers and etc.

Requirements

Basic knowledge of linux is required
Basic knowledge of vulnerabilities

Last Updated 1/2023

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
.pad/0373 B
.pad/132.2 KB
.pad/10110.2 KB
.pad/11439.2 KB
.pad/12222.8 KB
.pad/13370.1 KB
.pad/14372.9 KB
.pad/1589.4 KB
.pad/16416.9 KB
.pad/17214.9 KB
.pad/18861.4 KB
.pad/1978.4 KB
.pad/229.9 KB
.pad/20324 KB
.pad/21558.2 KB
.pad/22613.2 KB
.pad/23222.3 KB
.pad/24536.3 KB
.pad/25628.6 KB
.pad/26108.3 KB
.pad/27983.2 KB
.pad/28681.7 KB
.pad/29668.2 KB
.pad/36.8 KB
.pad/30789 B
.pad/3145.4 KB
.pad/32860.5 KB
.pad/33384 KB
.pad/34873.8 KB
.pad/35882.8 KB
.pad/36266.6 KB
.pad/37646.1 KB
.pad/38821.8 KB
.pad/39863.6 KB
.pad/423.4 KB
.pad/40351.7 KB
.pad/557.6 KB
.pad/6646.8 KB
.pad/7332.2 KB
.pad/8193.3 KB
.pad/9649.7 KB
TutsNode.net.txt59 B
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/10. Footprinting websites/1. Wahtweb scanner.mp4106.4 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/10. Footprinting websites/2. Netcraft.mp459.3 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/10. Footprinting websites/5. Whois recon.mp450.7 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/10. Footprinting websites/7. OSINT.mp486.6 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/10. Footprinting websites/8.1 Document 7.pdf73.8 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/11. Browser addons for recon/2. retire.js addon.mp449.2 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/11. Browser addons for recon/5.1 Section - 11 ( Resource ).pdf82.7 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/12. WAF idetification/1. WAF Identificaton.mp462.9 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/14. Fuzzing (Content-Discovery)/1. Automation for replacing parameters with Payloads.html12 B
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/14. Fuzzing (Content-Discovery)/3. ffuf.mp464.4 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/15. Port scanning/4. Firewall bypass technique.mp455.1 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/15. Port scanning/4.1 Section - 15 ( Resource ).pdf77 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/16. Fast port scanning/1. naabu.mp448.7 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/17. Visual recon/1. Gowitness.mp482.2 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/18. Google dorking/4. Golden rules of google dorking.mp475.5 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/18. Google dorking/5. Google dorking operators.mp456.2 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/18. Google dorking/6. Google search operators ( Part - 1 ).mp4105.9 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/18. Google dorking/7. Google search operators ( Part - 2 ).mp4176.8 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/18. Google dorking/7.1 Section - 18 ( Resource )-2.pdf136.5 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/19. Google dorking practical/1. Introduction to practical google dorking.mp4143.9 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/19. Google dorking practical/7. Reading materials for google dorking.mp475.4 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/19. Google dorking practical/7.1 Section - 18 ( Resource )-2.pdf136.5 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/2. Subdomain enumeration from tools/1. Subdomain enumeration #1.mp479.7 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/2. Subdomain enumeration from tools/2. Subdomain enumeration #2.mp457 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/2. Subdomain enumeration from tools/3. Subdomain enumeration #3.mp457.3 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/2. Subdomain enumeration from tools/5. Subdomain bruteforcing tools.mp449.4 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/2. Subdomain enumeration from tools/7. Subdomain generator.mp457 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/2. Subdomain enumeration from tools/7.1 Section - 2 ( Resource ).pdf191.5 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/21. Shodan dorking/2. Shodan web interface.mp4103.6 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/21. Shodan dorking/3. Shodan search filters.mp494.6 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/21. Shodan dorking/3.1 List of shodan general filters.pdf39.1 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/21. Shodan dorking/3.2 List of shodan search facets.pdf34.5 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/21. Shodan dorking/3.3 Section - 21 ( Resource ).pdf268.6 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/21. Shodan dorking/4. Resource.html1.2 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/22. Shodan dorking practical/1. Finding servers.mp481.9 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/22. Shodan dorking practical/2. Finding fIles and directories.mp469.8 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/24. Github dorking/1. Introduction to github dorking.mp460 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/24. Github dorking/2. Github dorking practical.mp4152.6 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/25. Vulnerability scanning/1. Nuclei tool.mp4118.7 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/25. Vulnerability scanning/2. WP-Scan.mp494.6 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/25. Vulnerability scanning/3. List of shodan search filters.html12 B
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/25. Vulnerability scanning/4. Scanning with burpsuite.mp451.1 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/26. Metasploit for recon/1. DNS recon using metasploit.mp455.6 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/26. Metasploit for recon/2. Sub-domain enumeration using metasploit.mp4121.4 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/28. Payloads/1. Payloads for bug hunters and penetration testers.html1.5 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/28. Payloads/1.1 My_personal_payload_collection.rar246.9 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/29. How to create tools for recon/2. URL extractor from javascript files.mp4176.9 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/29. How to create tools for recon/3. SSRF finder tool.mp487.9 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/29. How to create tools for recon/4. Full website recon tool.mp4242.7 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/3. Subdomain enumeration from websites/2. Subdomain enumeration from website #2.mp467.5 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/3. Subdomain enumeration from websites/4.1 Section - 3 ( Resource ).pdf177.3 KB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/4. Filtering live domains/1. Filtering live domains.mp4160.5 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/5. URL extraction from the internet/1. URL extraction from the internet #1.mp482.8 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/5. URL extraction from the internet/2. URL extraction from the internet #2.mp4101.8 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/7. Finding URL from past/1. URL from past.mp449.2 MB
[TutsNode.net] - Recon for bug bounty, penetration testers & ethical hackers/8. Sorting urls/1. Sorting url for vulnerabilities.mp4113.8 MB

Alternative Torrents for 'Recon for bug bounty penetration testers ethical hackers'.

There are no alternative torrents found.