- Introduction To Recon
- Live Recon On Bug Bounty target
- Live Recon On Bug Bounty target -2
- Live Recon On Bug Bounty target -3
- Live Recon On Bug Bounty target -4
- Automation for Fun and Profit
This course will introduce you to the Reconnaissance of web applications and will help Students, Bug Bounty Hunters, and Pentesters to dive into the Reconnaissance and help them find more Security Flaws by performing in-depth Recon on web applications.
This is a short-term beginner-friendly practical course that covers different types of techniques and strategies to perform scope-based recon and also shows how much importance Recon carries while Pen-testing or while doing Bug Hunting.
Takeaways: You will be able to perform Recon effectively and also you will learn how the scripts are modified which can help in automating/modifying the scripts on your own which makes it easier and save you time while doing enumeration on multiple targets.
Modules Introduced in this Course:
Overview of Recon
Selecting the Right Target
Performing Recon and Increasing the Attack Surface
Scope Based Recon
Why Scope-based Recon?
What to Look for in Small, Medium, and Large Scope Recon?
Subdomain Enumeration Using Subfinder, Assetfinder
Introduction to automation and one-liners to make things easy
Resolving Subdomains using HTTPX
Introduction to Nuclei and understanding the templates
Nuclei live demonstration
Introduction to Github Recon and clearing misconceptions about false findings
Hunting Sensitive data on GitHub using Githound
Introduction to Github Dorking
Introduction to directory enumeration using dirsearch
Understanding recursive directory enumeration with a live demonstration
Managing HTTP status codes while enumeration
Automating directory enumeration
Automation for Fun and Profit
Learn modeling to texturing in Blender for Beginners to better blender users
Learn the Important Tools of KDSPY to conduct Niche Research, Keyword and Competition Research for KDP Self-Publishing
Expertise Balancing Transparency, Fairness, and Prevention Strategies to Safeguard Organization
Follow along every step of the way, learning Swedish 1-on-1 with Felix Lattman. After only 30 h you'll speak Swedish!
Learn to crack passwords for Word, Excel and PowerPoint files on Windows and on Kali Linux
Master the Parts of Speech and Essential English Verbs
Detox Technologies is an ISO 27001-2013 certified Global Consultation and Implementation company, Headquartered in derbyshire UK & R&D Center in Delhi. We believe in precision and quality above everything else. We are the trusted standard for companies and individuals acquiring services to protect their brands, businesses and dignity from baffling Cyber-attacks. We provide end to end cyber security solutions to our clients. Our thrust on securing the People-Process-Technology has enabled us to offer impenetrable security to our clients across the world. Our success stories are translated in the form of positive testimonials from our growing list of clients.
Detox is a cyber security firm focused on high quality security testing for enterprises. We specialise in black box, grey box and white box penetration testing.