Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Broad Scope Bug Bounties HandBook
Theory
00_Subdomain_enumeration.pdf
Introduction
Answering your questions (1:53)
General methodology
0 Manual recon (14:31)
0 Manual Recon - Slides
1 Automatic recon.mp4 (16:09)
0 Manual recon - Full text
1 Automatic subdomain enum - Slides
2 Processing subdomains.mp4 (4:18)
2 Checking the list - Slides
Manual hacking
3 Subdomain flyover.mp4 (6:08)
3 Subdomain flyover.pptx
4 Exploiting open ports.mp4 (6:08)
4 Exploiting open ports.pptx
Vulnerability scanning
A Vulnerability scanning (11:01)
A Vulnerability scanning.pptx
B Our attack strategy.mp4 (10:04)
B Chaining it all together.pptx
Practical
1._Creating_our_list_of_su20creating20our20list20of20subdomains
2._Processing_Our_List_Of_S20processing20our20list20of20subdomain
3._Subdomain_flyov20subdomain20flyover
4._Exploiting_open_p20exploiting20open20ports
A._Vulnerability_scanni20vulnerability20scanning
B._Vulnerability_testing_stra20vulnerability20testing20strategy (1)
Extra: Analyzing JS files
60 Analysing JS files
Methodology summarized
70 Broad scope methodology (11:49)
71 Broad scope methodology - Slides
72 Broad scope manual methodology (11:12)
73 Broad scope manual methodology - slides
Resources
87 Quiz: Creating nuclei templates
88 What_the_ffuf
89 Directory brute forcing
90 You are probably doing directory brute forcing wrong... here’s why.mp4 (5:43)
91 Aquatone demonstration (3:18)
92 Nuclei template cheat sheet.png
93 Nuclei scanning overview
94 vulnerability scanning overview
95 Broad Scope Methodology overview
97 Exploit-db examples.mp4 (3:15)
98_Running_your_scripts_on_a_VPS
99._List_of_to20list20of20tools.pdf
Teach online with
1 Automatic recon.mp4
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock