- Peoples says Complete your basic before jumping into Web pentesting or Bug Bounty. But for a beginner this was very difficult to find resource step by step in systematic way....
- So I made this for to make your life easy.....
- I have made this in proper lesson ..... After completing this repo you will gain all the basic that you need in Bug bounty or web pentesting
- Ok All The Best For Your Journey....
-
Lesson 2 Data Transmission Mode-Simplex,Half Duplex and Full Duplex
-
Lesson 3 OSI MODEL
-
Lesson 4 TCP/IP Model
-
Lesson 5 What is Hub,Bridge,switch and Router
-
Lesson 6 Network Topology-Mesh,Bus,Ring,Star,hybrid and Tree Topology
-
Lesson 7 Types of Computer Network
-
Lesson 8 IP Addressing
-
Lesson 9 IPv4 Header
-
Lesson 10 What is IPv6
-
Lesson 11 Domain Name System
-
Lesson 12 Dynamic Host Configuration Protocol
-
Lesson 13 Simple Mail Transfer Protocol
-
Lesson 14 ARP | RARP
-
Lesson 15 File Transfer Protocol
-
Lesson 16 POP3 and IMAP Protocol
-
congratulations Now you have Understanding of Networking
-
Lesson 17 HTTP vs HTTPS
-
Lesson 18 ICANN, IANA, IEEE & EIA/TIA
-
Lesson 19 MAC Address
-
Lesson 20 What is Proxy & Proxy Server
-
Lesson 1 Vulnerability vs Threat vs Risk | What is Vulnerability
-
Lesson 2 VA vs PT | VAPT
-
Lesson 3 What is SOP
-
Lesson 4 URL Encoding VS HTML Encoding
-
Lesson 5 How TCP Header Works
-
Lesson 6 HTTP Request Headers
-
Lesson 7 UDP Header in Depth
-
Lesson 8 How Firewall works
-
Lesson 9 How Ports Work
-
Lesson 10 Concepts of web applications
-
Lesson 11 Server in depth
-
Lesson 12 Front end Vs Back End Explained
-
Lesson 13 Proxy vs reverse proxy vs load balancer
-
Lesson 14 CMS
-
Lesson 15 What is Load Balancing
-
Lesson 16 DNS Records
-
Lesson 17 Domain and Hosting
-
congratulations you have completed all the lessons of Web Fundamentals . Now you have understanding of web , But I will request you to go and solve the Web Fundamentals room in tryhackme to test your knowledge.Good Luck
-
Lesson 1 Kali Linux
-
Lesson 2 /etc/passwd vs /etc/shadow
-
Lesson 3 Linux File System
-
Lesson 4 Whois
-
Lesson 5 Overthewire CTF Important
-
Lesson 6 cURL Basics
-
Lesson 7 NMAP Overview
-
Lesson 8 NMAP TCP Connect Scan
-
Lesson 9 NMAP SYN SCAN
-
Lesson 10 NMAP in Depth
-
Lesson 11 NMAP UDP Scan
-
Lesson 12 Netcat in Depth
-
Lesson 13 All About Encrypted Shell
-
Lesson 14 Bind Shell VS Reverse Shell
-
Lesson 15 Hydra Tool in Depth
-
Lesson 16 CeWL
-
Lesson 17 Hashcat in Depth
-
Lesson 18 Crunch in Depth
-
Lesson 19 Directory Brutforcing with Dirb
-
Lesson 20 Nikto
-
Lesson 21 Github Recon
-
Lesson 22 Github Recon Automation
-
Lesson 23 Google Recon
-
Lesson 24 FUFF Ofensive use
-
Lesson 25 Wordpress Recon
-
Lesson 26 Subdomain Enumeration
-
Lesson 27 Nuclei in depth
-
Lesson 28 Advance Commands
-
Lesson 29 Fuzzing
-
Lesson 30 Google Recon
-
Lesson 31 FUFF Ofensive use
-
Lesson 32 Wordpress Recon
-
Lesson 33 Subdomain Enumeration
-
Lesson 34 Nuclei in depth
-
Lesson 35Advance Commands
-
Lesson 33 Complete Burpsuite Walkthrough
-
congratulations you have completed all the lessons of kALI Linux and Offensive recon. Now you have Know of kali linux and all the tools and scripts used in Recon.