Master reconnaissance techniques for ethical hacking, pentesting, and bug bounties in this hands-on course. Learn to expand attack surfaces, perform subdomain enumeration, fuzz targets, and automate processes with industry-leading tools.
Learn how to identify and map potentially vulnerable external assets using OWASP Amass, the industry-standard tool for asset discovery. This course covers passive and active reconnaissance techniques to scan, analyze, and secure exposed assets.
Mastering Follina (CVE-2022-30190): Exploitation, Detection and Mitigation
Learn how attackers exploit the Follina vulnerability (CVE-2022-30190) in Microsoft Office and develop the skills to analyze, detect, and mitigate this critical flaw through hands-on exercises and real-world examples.