Top 5 Tools & Techniques for Penetration Testing
This course contains Top 5 Pentesting tools for Pentesting & Bug Bounties which will help you in practicals for the Information Security Industry.
Legal Considerations
Why Nmap
Nmap Installation Windows
Nmap Installation Linux
Nmap Email Enumeration
Nmap Fake TTL
Nmap RCE Method Exploitation
Nmap XML Output to CSV
Nmap Decoy Scan Bypass Firewalls
Nmap Spoof MAC Address
Nmap Cheatsheet
Burp Suite Setup and Practical
Burpsuite CTF Approach
Google Dorks
Become Author of your Google Dork
Dirsearch - SDE Live Hunting
Sublist3r
Project Discovery Subdomains
Resolving IP's & Domains + CIDR
Resolving Subs + Status Code + Banner Grab
Automated Way
Manual Way
Installation of Linux Kali 2020.2
Installation & Lab Setup
Shodan API Setup
Shodan Information & Count
Shodan Scan Downloads
Shodan Host Enumeration
Shodan Parse Dataset
Shodan Search Query
Shodan Scan Commands
Shodan Stats
Shodan GUI
Shodan Report Generation
Shodan Report Generation 2
Shodan Images
Shodan Exploits
Bonus: Shodan Extension
Breakdown of HTTP Request