0% found this document useful (0 votes)
12 views6 pages

Syllabus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views6 pages

Syllabus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Course Syllabus:

 Introduction to the course


o Requirements
o Resources
 Introduction of James Beers (whoami)
o 1 slide intro with credibility statements
 Explanation of recon (the meaning, the purpose, and the
data) 20mins
o What is recon?
o How can I use recon efficiently?
o What types of recon are there?
 Thinking like a hacker during recon (this is where the
questline comparison comes in) 1hr
o What do sensitive files look like?
o What services should I try to exploit first?
o Sensitive directories.
o OSINT
o Code review
o Api investigation
o Error messages
o Following javascript endpoints
o What would a hacker do?
 Methodology(Recon)
o Find subdomains
o Find URLs
o Find Wayback and crawled content
o Find keys and cookies
o Find javascript on all live subdomains
o Find more URLs from the javascript
o Apply all the things found to the enumeration of
anything your find after this process
o Apply everything you find that is interesting to the
main target
o Enumerate the logic of the application
 Places for recon online 2mins
o Common places I look
o Common places XSS Rat looks
o Places for recon data other than google 2mins
o Tutorial for using censys
o Tutorial for using shodan
o Tutorial for using BuiltWith
 Tools for recon 25 mins
o Amass
o Subfinder
o Assetfinder
o Gau
o Httprobe
o hakrawler
 How to use each tool 1hr
o Setting up and toning down your tools
o Finding the right flags to use
o Using these tools with multiple targets
o Using these tools to enumerate wildcard domains
*sub.domain.com
o Setting up amass
o Using amass
o Setting sub finder
o Using sub finder
o Setting up assetfinder
o Using asset finder
o Setting up gau
o Using gau
o Setting up httprobe
o Using httprobe
o Setting up hakrawler
o Using hakrawler
o Troubleshooting video
 What to do with the data for each tool 30mins
o Httprobe data
o Httprobe workflow
o Gau data
o Gau workflow
o Hakrawler data
o Hakrawler workflow
 Recon on IP addresses 45 mins
o Nmap usage
o Research on results
o Different ways to use Nmap
o Scanning services for over 1,000 subdomains
o Troubleshooting video
 Recon on domains 45 mins(video)
o Technology profile and why we care
o Previously used technologies and why we care
o Current API docs and why we care
o Backend language enumeration and why we care
o URLs to look for and why
o Troubleshooting video
 Recon on gau 15-30 mins
o Gau and what it pulls from
o Results of gau and how to filter them
o Gf patterns and where to find more
 Recon on subdomains 20 mins
o Amass
o Subfinder
o Assetfinder
 Recon with javascript 1hr
o What am I looking for in javascript 30mins
o Links
o Directories
o Keys
o Endpoints
o DOM functions
o Privileged functions
o Directories and what they look like
o Why different styles of directories
o How to handle regex in javascript
o What files should I look for
o What does a key look like in javascript
o What endpoints can we find
o API endpoints in javascript
o Scripts in source code
o Source code in scripts
 Recon with headers and CORS policy 30mins
o What is a CORS policy10mins
o CORS policies and what they are
o Proper implementation of CORS
o Improper implementation of CORS
o Reading the cross-origin policy header
o Applying the “allowed” domains to your enumeration
o Enumerating and looking for internal networks
o Internal network interaction
o CSRF check EVERYTHING
 All data and how it applies to your target in question 5
mins 30sec
o Bringing everything back around
o Providing VDP targets Google and Walmart
o Asking for reviews of this course
o Thanking the student
o Discord
 Outro and thanks
TOTAL TIME 7.65 hours of course on recon.
This is the outline that I was thinking and I think that at the
end of this lesson we can tease that we will be releasing a
follow-up course where I can teach them to build out
python tools for fuzzing IP/port checking with service
enumeration and subdomain scraping.

You might also like