
About Course
This course introduces the top five tools for penetration testing and bug bounties, providing practical knowledge for the information security industry. Participants will learn how to effectively use these tools in real-world scenarios.Course curriculum
Nmap - The Network Mapper
- Legal Considerations
- Why Nmap
- Nmap Installation Windows
- Nmap Installation Linux
- Nmap Email Enumeration
- Nmap Fake TTL
- Nmap RCE Method Exploitation
- Nmap XML Output to CSV
- Nmap Decoy Scan Bypass Firewalls
- Nmap Spoof MAC Address
- Nmap Cheatsheet
Burpsuite
- Burp Suite Setup and Practical
- Burpsuite CTF Approach
Google Hacking Database
- Google Dorks
- Become Author of your Google Dork
Content Discovery Tools
- Dirsearch - SDE Live Hunting
- Sublist3r
- Project Discovery Subdomains
- Resolving IP's & Domains + CIDR
- Resolving Subs + Status Code + Banner Grab
Github Recon
- Automated Way
- Manual Way
Linux
- Installation of Linux Kali 2020.2
Shodan
- Installation & Lab Setup
- Shodan API Setup
- Shodan Information & Count
- Shodan Scan Downloads
- Shodan Host Enumeration
- Shodan Parse Dataset
- Shodan Search Query
- Shodan Scan Commands
- Shodan Stats
- Shodan GUI
- Shodan Report Generation
- Shodan Report Generation 2
- Shodan Images
- Shodan Exploits
- Bonus: Shodan Extension
Anatomy of HTTP Request
- Breakdown of HTTP Request
Snapshot
- Snapshot of Tools And Techniques for Passive Recon
- Snapshot of Tool:- Massdns
- Introduction of Hakrawler:- uncover concealed files and directories on web servers
- Snapshot of Open Redirect
- Open Redirect Best Practices