This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT).
In this training you will also learn how to perform dark web research and reconnaissance. You will learn how to use Tor, proxies, and proxychains, and even how to create your own VPN servers in cloud environments.
install it on a VM. Use the hypervisor of your choice (e.g., VirtualBox, VMWare Workstation/Fusion, ESXi, Proxmox, etc.).
After you have installed Kali Linux or Parrot Security, setup websploit as per the instructions at websploit.org