Author: Netploy Security

Enumeración de subdominios – Recon parte 2

Subdomain Enumeration – Recon part 2

Inspired by part two of Topics: Set up your VPS server To list subdomains of a target, the easiest way is programmatic automation. First of all we need to have a Linux-based operating system, such as the KaliLinux distribution that can be used as a virtual machine from Vmware in Windows. But

Read More
Wide scope Program – Recon parte 1

Wide scope Program – Recon part 1

A different approach to traditional recognition. When a vulnerability search is carried out for a company, and not enough information is provided, it is difficult to have a map about all the assets that correspond to the company. In this entry you can obtain information on different techniques to locate those targets that are not visible

Read More
OnlineShoop Bug Bounty

OnlineShop Bug Bounty

Below are some TIPS that can be used when practicing Bug Bounty.

Read More