Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Recon for Ethical Hacking / Penetration Testing & Bug Bounty
Training Overview
Description of Training
Video Overview (3:28)
Section 1: Introduction
1. Introduction (7:00)
2. Motivation & Importance (7:28)
3. Future Updates (3:36)
4. Rules for asking Questions
5. Disclaimer (0:59)
Section 2: Note Keeping
6. Note Keeping Importance (4:49)
7. How to make Notes (8:49)
8. Effective Note Keeping for Pentest & Bug Bounties (10:16)
9. Visual Notes (7:29)
Section 3: Bug Bounty Recon Introduction
10. Top 10 Rules for Bug Bounties (6:50)
11. Zen Poem (1:56)
12. What is Web (6:07)
13. What is DNS (9:26)
14. How does Web Server Work? (8:44)
15. Revision of Web, DNS and Server
16. URL vs URN vs URI (7:09)
17. Breakdown of URL (5:54)
18. Revision of URL
19. How to make the best out of this course
20. Feedback Time!
Section 4: Shodan for Bug Bounties
21. Shodan Installation & Lab Setup (3:55)
22. Shodan API (2:46)
23. Shodan Info & Count (5:20)
24. Shodan Scan Downloads (7:04)
25. Shodan Revision
26. Shodan Host Enumeration (5:35)
27. Shodan Parse Dataset (3:34)
28. Shodan Search Query (2:47)
29. Shodan Scan Commands (8:11)
30. Shodan Stats (3:01)
31. Shodan GUI (5:29)
32. Shodan Report Generation (4:11)
33. Shodan Report Generation - Part 2 (5:33)
34. Shodan Images (4:54)
35. Shodan Exploits (4:18)
36. Shodan Live Hunting - Remote Code Execution (10:16)
37. Shodan Live Hunting - Sensitive Data Exposure (7:55)
38. Exploitation of CVE 2020-3452 File Read (19:23)
39. Exploitation of CVE 2020-3187 File Delete (8:44)
40. Shodan Live Hunting - Jenkins Exploitation Logs (8:42)
41. Shodan Live Hunting - Jenkins Exploitation Credentials (5:45)
42. Shodan Live Hunting - ADB (14:00)
43. BONUS Shodan Extension (3:13)
44. Shodan Revision
Section 5: Certificate Transparency for Subdomain Enumeration
45. Certificate Transparency Crt.sh (11:18)
46. Certificate Transparency Crt.sh Wildcards (12:07)
47. Certificate Transparency Crt.sh Automation (7:01)
48. Shodan Subdomain Enumeration (8:08)
49. Shodan Subdomain Enumeration Automation (2:53)
50. Censys Subdomain Enumeration (7:23)
51. Censys Subdomain Enumeration Automation (10:44)
52. Facebook Certificate Transparency (4:43)
53. Google Certificate Transparency (4:26)
54. Certificate Transparency Revision
6.Scope Expansion
55. Pentest Tools (4:45)
56. Virus Total (8:31)
57. Sublister -1 (13:48)
58. Sublister -2 (8:11)
59. Sublister -3 (3:47)
60. Project Discovery Data Sets (5:26)
61. Project Discovery Data Sets CLI (6:00)
62. Project Discovery Data Sets CLI -2 (3:16)
63. Nmmapper (7:25)
64. Revision of Scope Expansion
7.Diving in depth of Archives for Bug Bounties
65. Wayback URL Introduction (4:32)
66. Wayback URL -2 (2:48)
67. Wayback URL Tool (5:49)
68. Wayback Iframe (7:38)
69. Wayback URL with Burp (4:08)
70. Wayback URL Automation -1 (15:58)
71. Wayback URL Automation -2 (15:28)
72. Wayback URL Automation -3 (3:40)
73. Wayback URL Live Hunting Bugcrowd (8:09)
74. Wayback URL Report Breakdown (2:11)
75. URL's from wayback,otx,commoncrawl (8:55)
8.DNS Enumeration for Bug Bounties
77. DNS Goodies (17:00)
76. DNS Dumpster for Subdomains (15:21)
78. Bonus DNS Dumpster Workflow
9.CMS Identification
79. Wappalyzer for Technology Identification (8:10)
80. Builtwith for Technology Identification (5:43)
81. Whatweb Opensource Technology Identification (5:57)
82. Netcraft Active Cyber Defence (11:33)
83. Retire JS - Hunt Outdated JS Libraries (6:20)
84. Retire JS - Burp Installation (4:32)
10.Fuzzing
85. Fuzzing Introduction (3:01)
86. Fuzzing Importance (2:55)
87. Fuzzing Process (4:24)
88. Fuzzing Step by Step (8:00)
89. Installation of Burpsuite (17:04)
90. Fuzzing on Lab (6:26)
91. Fuzzing on Live (6:01)
92. Fuzzing for Sensitive Files (5:17)
93. Fuzzing for Sensitive Files -2 (3:01)
94. Fuzzing Multiple Layers (5:01)
95. Wfuzz Installation (2:22)
96. Wfuzz Installation -2 (3:10)
97. Wfuzz Basic Fuzzing (4:29)
98. WFuzz Login Authentication (7:59)
99. Wfuzz HTTP Basic Auth Live (7:51)
100. FFUF - Fuzz Faster U Fool
101. FFUF Installation (5:59)
102. FFUF Working (6:46)
103. FFUF Revision - Fuzzing
104. FFUF Directory Fuzzing with extensions (6:12)
105. FFUF Directory Fuzzing with extensions Revision
106. FFUF Revision - Filter & Matcher
107. FFUF Login Authentication FUZZ (9:28)
108. FFUF Revision - Login Authentication FUZZ
109. Join the Student Community
110. Solve the FUZZ CTF
11.Content Discovery
111. dirsearch (4:01)
12.WAF Identification
112. WAF Detection with Nmap (3:10)
113. WAF Fingerprinting with Nmap (2:11)
114. WafW00f vs Nmap (3:08)
13.Google Dorks
115. Google Dorks Manually (20:53)
116. How to become author of Google Dork (6:26)
14.Bug Bounty Platforms
117. Bucgrowd (17:41)
118. Hackerone (8:57)
119. Intigriti (10:43)
120. Open Bug Bounty (8:00)
121. Private RVDP Programs (6:25)
122. NCIIPC Govt. of India (8:27)
123. SynAck (5:41)
15.Mindmaps for Recon & Bug Bounties
124. What are Mindmaps (6:01)
125. Life Mindmap Example (3:43)
126. Breakdown of a Mindmap (7:03)
127. Mindmap by Jhaddix (5:24)
128. My Personal Mindmap by Rohit Gautam (18:48)
Section 16: Next Steps
129. Vote for the Next Module !
122. NCIIPC Govt. of India
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock