Persistence is very important. You should not give up unless you are forced to give up.

FYWTo9AWYAIgx6z.jpg

“The whole process of recon is to find more targets to hack.”

By Abhilov Gupta

Vulnerability lists

Starting phase

WAF Bypass

Recon Phase

Cloud recon/testing

Testing EC2 instances

Burp plugins

Asset identification

Third Party Vendors

waybackurls alternatives

Security Search Engines

detailed info you should gather about the target

Content discovery and fingerprinting

Subdomain Takeover

CVEs

Shodan Recon