Hands-on Bug Hunting Active and Passive Reconnaissance and Dark Web Research

Live training by Joseph Mlodzianowski and Omar Santos

TRAINING INFO AND COURSE SETUP

Bug Hunting Recon

This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT).

DarkWeb Recon

In this training you will also learn how to perform dark web research and reconnaissance. You will learn how to use Tor, proxies, and proxychains, and even how to create your own VPN servers in cloud environments.

COURSE SETUP

Download Kali Linux or Parrot Security

install it on a VM. Use the hypervisor of your choice (e.g., VirtualBox, VMWare Workstation/Fusion, ESXi, Proxmox, etc.).

01

Setup WebSploit

After you have installed Kali Linux or Parrot Security, setup websploit as per the instructions at websploit.org

02

The Team

Omar Santos

Joseph Mlodzianowski