About Course
This course covers the essential skills needed for bug bounty hunting and web reconnaissance, including domain discovery, subdomain enumeration, port scanning, content discovery, and vulnerability scanning. Learn how to use the latest tools and techniques for ethical hacking and online security assessments.
Master bug bounty hunting and web reconnaissance techniques to identify and exploit vulnerabilities in websites and applications.
Requirements
- ✓Basic understanding of networking and web technologies.
- ✓Familiarity with Kali Linux or any penetration testing operating system.
- ✓Willingness to learn ethical hacking techniques and tools.
Course Curriculum
Section 1: INTRODUCTION & DISCOVERING DOMAIN
1. INTRODUCTION TO COURSE
2. INSTALLING KALI LINUX
3. What is Domain
4. Domain Discovery #1
5. Domain Discovery #2
6. Domain Discovery #3
Assessment Exercise- 01
Section 2: DISCOVERING SUBDOMAINS
7. What is Subdomain
8. Subdomain Enumeration, Subfinder
9. Subfinder, Configuring API
10. Subdomain Enumeration, AMASS
11. AMASS, Filtering out Data
12. AMASS, API Configuration
13. Subdomain Enumeration, Bruteforcing
Assessment Exercise- 02
Section 3: DISCOVERING SUBDOMAINS PART 02
14. Subdomain Bruteforcing, FFuF
15. Subdomain Bruteforcing, GoBuster
16. Subdomain Bruteforcing, AMASS
17. Subdomain Bruteforcing, PureDNS
18. Subdomain Enumeration, VHOST
19. Combining Tools
20. Filtering Live Domains, Subdomains
Assessment Exercise- 03
Section 4: PORT SCANNING
21. WAF & ORIGIN IP
22. Finding Origin IP Address #1
23. Finding Origin IP Address #2
24. Port Scanning with NMAP
25. Vulnerability Scanning with NMAP
26. Port Scanning with NAABU
Assessment Exercise- 04
Section 5: CONTENT DISCOVERY
27. Installing Tools
28. Content Discovery, Basics of Dirsearch
29. Dirsearch, Finding Useful Information
30. Dirsearch, Adding Multiple Status Codes
31. Dirsearch, Using Custom Wordlist
32. Dirsearch, Adding Custom Headers
33. Dirsearch, Recursive Content Enumeration
34. Content Discovery, Introduction to FFUF
35. FFUF, Filtering out output
Assessment Exercise- 05
Section 6: CONTENT DISCOVERY PART 02
36. FFUF, Custom Headers
37. FFUF, Using Like a Pro!
38. Discovering Content Like a Pro #1
39. Discovering Content Like a Pro #2
40. Introduction to Passive Enumeration
41. Passive Enumeration, GetAllUrls
42. Passive Enumeration, WayBackURLs
43. Passive Enumeration, Combining Tools
44. Active Scanning, Katana
45. Choosing the Right Wordlist
Assessment Exercise- 06
Section 7: Final Exam
Final Exam
What You Will Learn
- ✓Learn the fundamentals of bug bounty hunting and web reconnaissance.
- ✓Master domain discovery techniques and tools.
- ✓Use NMAP for port scanning and vulnerability scanning.
- ✓Perform subdomain enumeration using various tools like AMASS, Subfinder, and GoBuster.
- ✓Learn to discover hidden content and vulnerabilities using tools like Dirsearch, FFUF, and WayBackURLs.
- ✓Understand passive and active enumeration techniques.
- ✓Prepare for a successful career in ethical hacking and bug bounty hunting.