How to scan the entire internet including AWS, Google cloud
- Description
- Curriculum
- FAQ
- Reviews
Unlock the advanced techniques of network scanning and broaden your penetration testing capabilities with this comprehensive course. Designed for aspiring ethical hackers and security enthusiasts, this course explores the art of efficiently scanning millions of IP addresses and expanding the potential attack surface. The application we create in the course is designed to last for many years.
The scanner we will create is much more effective than Shodan/ Censys or any similar search engine, because it can also find many IPs, subdomains, frameworks of small companies. I am not playing games here, this is not an average YouTube course or a simple course or a useless hacking certification course. This is a whole hacking massacre.
Basic Python knowledge is required. Please make sure that you have basic/beginner python knowledge as it may get very hard to understand the course. DO NOT copy and paste the code, if you don’t watch ALL the course videos and just use the app I create you will fail. Understand the entire course, you can then do amazing things such as adding more functionalities to the scanner.
I will only update the course if there will be a better technology to improve the scanner and currently there is no technology that can make this scanner run any faster. As of the year 2024, this is the fastest scanner in the world that you can use at your home. Haters are going to hate but nobody has currently coded any scanner like this because they know it would make their products(cost thousands of dollars a month) stop from selling but I am giving this to you for couple of dollars.
Mastering Network Scanning Techniques: Learn the ins and outs of various network scanning methodologies, including port scanning, host discovery, to gain a comprehensive view of your target network.
Efficient IP Address Enumeration: Acquire the skills to efficiently enumerate large sets of IP addresses, identifying potential entry points for penetration testing and vulnerability assessment.
Service Identification and Versioning: Hone your skills in identifying running services and their versions, enabling you to pinpoint specific vulnerabilities and potential avenues for exploitation.
WAF Bypass: Learn how to bypass WAFs by finding hidden IP addresses.
Who Should Enroll:
-
Cybersecurity Enthusiasts
-
Ethical Hackers and Penetration Testers
-
Bug Bounty Hunters
-
IT Professionals Seeking Advanced Security Skills
-
Network Administrators Interested in Security
-
Students Pursuing a Career in Cybersecurity
-
Red team / Blue team members
Embark on a transformative journey to elevate your network scanning proficiency. By enrolling in this course, you’ll gain exclusive access to advanced techniques that will revolutionize your approach to security assessments. Discover the nuanced art of efficient IP address enumeration and master the strategic expansion of the attack surface. These skills are pivotal for conducting highly effective penetration tests and in-depth vulnerability assessments.
Prepare to take your network scanning skills to the next level. Enroll now and unlock the secrets to efficient IP address enumeration for effective penetration testing and vulnerability assessment.
-
8Extracting IPs from subnetVideo lesson
Do not just copy/paste the code, understand each and every line so you can do whatever you want in the future.
-
9Getting all google cloud IP addressesVideo lesson
curl -s https://www.gstatic.com/ipranges/cloud.json | jq -r '.prefixes[] | select(.ipv4Prefix != null) | .ipv4Prefix' > googleIPs.txt
-
10Getting all AWS IP addressesVideo lesson
curl -s https://ip-ranges.amazonaws.com/ip-ranges.json | jq -r '.prefixes[].ip_prefix' > AWS.txt
-
11Get SSLVideo lesson
We use these versions in the code:
aiohttp 3.8.5
asyncio 3.4.3
pyOpenSSL 23.2.0
-
12Preparing Requests for multiple protocols and limiting themVideo lesson
-
13Finishing the scannerVideo lesson
Make sure to download the scanner.py file . This is the finished scanner.py file you need to use to scan. If the scanner does not extract enough IPs, change your VPN software.
We use these versions in the code:
beautifulsoup 4.12.2
-
14Creating the Database and testing the scannerVideo lesson
-
15Finishing the backendVideo lesson
Make sure to download the updated server.py file. This is the finished server.py file
WATCH THE ENTIRE VIDEO, AT THE END OF THE VIDEO I EXPLAIN THE PURPOSE OF THIS TOOL WE CREATE.
Remember, the purpose is to identify vulnerable services using the values from the response headers ,title, response_text, response_headers. Use these information to find different vulnerable versions of apps used on the target and we also find many internal IP addresses. You can try to access more virtual hosts if there are any on those IP addresses and try other attack vectors. So, at the end of the day this is what Shodan does. Here we do exactly the same thing without paying for Shodan of course, creating our own tool from scratch.
-
16Running the backend for productionVideo lesson
External Links May Contain Affiliate Links read more