Recon For Bug Bounty, Penetration Testers & Ethical Hackers
Maximize your bug bounty hunting with expert-led recon course. Info gathering, tools & techniques covered.
IT & Software,Network & Security,Bug Bounty
Lectures -97
Resources -12
Duration -9 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
This course is fully made for website reconnaissance for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.
Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more...
This course is fully focused on website recon and vulnerability assessment.
There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.
All the resources are provided in the resource section including links, pdf, payloads that are used in course.
Course Curriculum :
Introduction
Introduction to recon
Subdomain enumeration from tools
Subdomain enumeration #1
Subdomain enumeration #2
Subdomain enumeration #3
Subdomain enumeration #4
Subdomain bruteforcing
Filtering unique domains
Subdomain generator
Subdomain enumeration from websites
Subdomain enumeration from website #1
Subdomain enumeration from website #2
Subdomain enumeration from website #3
Subdomain enumeration from website #4
Filtering live domains
Filtering live domains
URL extraction from the internet
URL extraction from the internet #1
URL extraction from the internet #2
Finding parameters
Finding parameters
Parameter bruteforcer
Finding URL from past
URL from past
Sorting urls
Sorting url for vulnerabilities
Automation for replacing parameters with Payloads
Automation for replacing parameters with Payloads
Footprinting websites ( Website recon )
Whatweb recon
Netcraft
Security headers
Dnsdumpmaster
Whois recon
Mxtoolbox
OSINT
Maltego
Browser addons for recon
wappalyzer
retire.js
shodan
Knoxx
Hack-tools addon
WAF idetification
WAF identification
Subdomain takeover
HostileSubBruteForcer
Sub404
Subjack
Fuzzing (Content-Discovery)
dirb
ffuf
Port scanning
Introduction to nmap
Port specification in nmap
Service and version detection from nmap
Firewall bypass technique
Fast port scanning
nabbu
masscan
Visual recon
Gowitness
Google dorking
Introduction to google dorking
Understnding the URL structure
Syntax of google dorking
Google dorking operators
Google search operators ( Part - 1 )
Google search operators ( Part - 2 )
Google dorking practical
Introduction to practical google dorking
How to find directory listing vulnerabilities ?
How to dork for wordpress plugins and thems ?
How to dork for web servers versions ?
How to dork for application generated system reports ?
Dorking for SQLi
Reading materials for google dorking
Tips for advance google dorking
Tip #1
Tip #2
Tip #3
Shodan dorking
Intro to shodan dorking
Shodan web interface
Shodan search filters
Shodan dorking practical
Finding server
Finding fIles and directories
Finding operating systems
Finding compromised devices and websites
Shodan command line
Introduction to shodan command line
Practical shodan in command line
Github dorking
Introduction to github dorking
Github dorking practical
Vulnerability scanning
Nuclei
Wp-Scan
Scanning with burpsuite
Metasploit for recon
DNS recon using metasploit
Sub-domain enumeration using metasploit
E-mail address finding
Port scanning using metasploit
TCP SYN port scan using metasploit
SSH version detection
FTP version enumeration
MySQL version detection
HTTP enumeration
Payloads for bug bounty hunters
Payloads for bug hunters and enetration testers
How to create tools for recon ?
SSRF finder tool
XSS finding too
URL extractor from javascript files
Full website recon tool
Bonus
Bonus video
Thank you :)
Vivek Pandi
Who his course is for:
- Bug bounty hunters, penetration testers, ethical hackers and etc.
This course is fully made for website reconnaissance for bug bounty hunters, penetration testers & ethical hackers. This is a intermediate level course all the topics are discussed here regarding recon on websites.
Some of the topics are what is reconnaissance, what is recon , recon for bug bounty hunters and penetration testers, Subdomain enumeration, URL enumeration, parameter bruteforcing, Creating your own recon tools and many more...
This course is fully focused on website recon and vulnerability assessment.
There will be full methodology of website reconnaissance, bug bounty hunting, penetration testing. The videos are divided into small sections for the students to learn.
All the resources are provided in the resource section including links, pdf, payloads that are used in course.
Course Curriculum :
Introduction
Introduction to recon
Subdomain enumeration from tools
Subdomain enumeration #1
Subdomain enumeration #2
Subdomain enumeration #3
Subdomain enumeration #4
Subdomain bruteforcing
Filtering unique domains
Subdomain generator
Subdomain enumeration from websites
Subdomain enumeration from website #1
Subdomain enumeration from website #2
Subdomain enumeration from website #3
Subdomain enumeration from website #4
Filtering live domains
Filtering live domains
URL extraction from the internet
URL extraction from the internet #1
URL extraction from the internet #2
Finding parameters
Finding parameters
Parameter bruteforcer
Finding URL from past
URL from past
Sorting urls
Sorting url for vulnerabilities
Automation for replacing parameters with Payloads
Automation for replacing parameters with Payloads
Footprinting websites ( Website recon )
Whatweb recon
Netcraft
Security headers
Dnsdumpmaster
Whois recon
Mxtoolbox
OSINT
Maltego
Browser addons for recon
wappalyzer
retire.js
shodan
Knoxx
Hack-tools addon
WAF idetification
WAF identification
Subdomain takeover
HostileSubBruteForcer
Sub404
Subjack
Fuzzing (Content-Discovery)
dirb
ffuf
Port scanning
Introduction to nmap
Port specification in nmap
Service and version detection from nmap
Firewall bypass technique
Fast port scanning
nabbu
masscan
Visual recon
Gowitness
Google dorking
Introduction to google dorking
Understnding the URL structure
Syntax of google dorking
Google dorking operators
Google search operators ( Part - 1 )
Google search operators ( Part - 2 )
Google dorking practical
Introduction to practical google dorking
How to find directory listing vulnerabilities ?
How to dork for wordpress plugins and thems ?
How to dork for web servers versions ?
How to dork for application generated system reports ?
Dorking for SQLi
Reading materials for google dorking
Tips for advance google dorking
Tip #1
Tip #2
Tip #3
Shodan dorking
Intro to shodan dorking
Shodan web interface
Shodan search filters
Shodan dorking practical
Finding server
Finding fIles and directories
Finding operating systems
Finding compromised devices and websites
Shodan command line
Introduction to shodan command line
Practical shodan in command line
Github dorking
Introduction to github dorking
Github dorking practical
Vulnerability scanning
Nuclei
Wp-Scan
Scanning with burpsuite
Metasploit for recon
DNS recon using metasploit
Sub-domain enumeration using metasploit
E-mail address finding
Port scanning using metasploit
TCP SYN port scan using metasploit
SSH version detection
FTP version enumeration
MySQL version detection
HTTP enumeration
Payloads for bug bounty hunters
Payloads for bug hunters and enetration testers
How to create tools for recon ?
SSRF finder tool
XSS finding too
URL extractor from javascript files
Full website recon tool
Bonus
Bonus video
Thank you :)
Vivek Pandi
Who this course is for:
- Bug bounty hunters, penetration testers, ethical hackers and etc.
Goals
Web Reconnaissance: Unlocking the Mysteries of Websites for Competitive Advantage
Beyond the Main Domain: Expert Tips for Discovering Subdomains
URL Mining: Advanced Techniques for Gathering Valuable Data and Insights
Parameter Discovery: Advanced Techniques for Uncovering Valuable Data
Information Mining: How to Unleash the Power of Data Through Smart Gathering
Unlocking the Power of Information: Safely Gathering Sensitive Data from Websites
Uncover the Hidden Truth: Mastering Deep Recon on Websites
Prerequisites
Basic knowledge of linux is required
Basic knowledge of vulnerabilities
![Recon For Bug Bounty, Penetration Testers & Ethical Hackers Recon For Bug Bounty, Penetration Testers & Ethical Hackers](https://d3mxt5v3yxgcsr.cloudfront.net/courses/16552/course_16552_image.jpg)
Curriculum
Check out the detailed breakdown of what’s inside the course
Tutorials Points Don't Clear My Payments Don't Buy Courses From Here.
1 Lectures
-
Introduction 05:19 05:19
Subdomain enumeration from tools
6 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Subdomain enumeration from websites
5 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Filtering live domains
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
URL extraction from the internet
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Finding parameters
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Finding URL from past
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Sorting urls
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Automation for replacing parameters with Payloads
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Footprinting websites (websites recon)
9 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Browser addons for recon
6 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
WAF identification
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Subdomain takeover
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Fuzzing(Content-Discovery)
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Recon with port scanning
5 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Fast port scanning recon
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Visual recon
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Google dorking
8 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Google dorking practical
7 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Tips for advance google dorking
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Shodan dorking
4 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Shodan dorking practicals
4 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Shodan command line
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Github dorking
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Vulnerability scanning
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Metasploit for recon
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Port scanning using metasploit
5 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Payloads
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
How to create tools for recon?
4 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Bonus
1 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Instructor Details
![Vivek P](https://www.tutorialspoint.com/assets/profiles/683541/profile/200_3016340-1718708283.jpg)
Vivek P
That's great to hear that Vivek Pandit is a successful ethical hacker. Who has a good know knowledge on Active Directory Pentesting, Ethical Hacking and Bug Bounty Hunting.
Furthermore, training more than 40000 students worldwide is a significant achievement and demonstrates his dedication to sharing his knowledge and expertise with others. It's important to have skilled professionals in the field of ethical hacking to help protect organizations from cyber threats and vulnerabilities.
Overall, it's encouraging to see individuals like Vivek Pandit making a positive impact in the cybersecurity industry, and I wish him continued success in his career.
Course Certificate
Use your certificate to make a career change or to advance in your current career.
![sample Tutorialspoint certificate](/market/public/assets/newDesign/img/primePacks/V-certificate.png)
Our students work
with the Best
![adobe logo](/market/public/assets/newDesign/img/adobe.png)
![adp logo](/market/public/assets/newDesign/img/adp.png)
![apple logo](/market/public/assets/newDesign/img/apple.png)
![armani logo](/market/public/assets/newDesign/img/armani.jpg)
![bosch logo](/market/public/assets/newDesign/img/bosch.png)
![capegemini logo](/market/public/assets/newDesign/img/capegemini.png)
![cisco logo](/market/public/assets/newDesign/img/cisco.png)
![hdfc bank logo](/market/public/assets/newDesign/img/hdfcbank.png)
![ibm logo](/market/public/assets/newDesign/img/ibm.png)
![intel logo](/market/public/assets/newDesign/img/intel.png)
![mastercard logo](/market/public/assets/newDesign/img/mastercard.png)
![netflix logo](/market/public/assets/newDesign/img/netflix.png)
![qualcomm logo](/market/public/assets/newDesign/img/qualcomm.png)
![samsung logo](/market/public/assets/newDesign/img/samsung.png)
![sony logo](/market/public/assets/newDesign/img/sony.png)
![unilever logo](/market/public/assets/newDesign/img/unilever.png)
![walmart logo](/market/public/assets/newDesign/img/walmart.png)
![adobe logo](/market/public/assets/newDesign/img/adobe.png)
![adp logo](/market/public/assets/newDesign/img/adp.png)
![apple logo](/market/public/assets/newDesign/img/apple.png)
![armani logo](/market/public/assets/newDesign/img/armani.jpg)
![bosch logo](/market/public/assets/newDesign/img/bosch.png)
![capegemini logo](/market/public/assets/newDesign/img/capegemini.png)
![cisco logo](/market/public/assets/newDesign/img/cisco.png)
![hdfcbank logo](/market/public/assets/newDesign/img/hdfcbank.png)
![ibm logo](/market/public/assets/newDesign/img/ibm.png)
![intel logo](/market/public/assets/newDesign/img/intel.png)
![mastercard logo](/market/public/assets/newDesign/img/mastercard.png)
![netflix logo](/market/public/assets/newDesign/img/netflix.png)
![qualcomm logo](/market/public/assets/newDesign/img/qualcomm.png)
![samsung logo](/market/public/assets/newDesign/img/samsung.png)
![sony logo](/market/public/assets/newDesign/img/sony.png)
![unilever logo](/market/public/assets/newDesign/img/unilever.png)
![walmart logo](/market/public/assets/newDesign/img/walmart.png)
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now![Annual Membership Annual Membership](/market/public/assets/newDesign/img/membership-large-small.jpg)
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now![Online Certifications Online Certifications](/market/public/assets/newDesign/img/traning-for-a-team.png)