YoVDO

Bug Bounty Recon Basics - Part 1

Offered By: NahamSec via YouTube

Tags

Bug Bounty Courses OSINT (Open Source Intelligence) Courses Data Manipulation Courses Reconnaissance Courses Shodan Courses

Course Description

Overview

Dive into the first part of a comprehensive video course on bug bounty reconnaissance basics. Learn essential techniques including subfinder usage, Google dorking, data manipulation, host command utilization, httpx and ASN explanations, Shodan basics, reverse WHOIS lookups, certificate transparency, and tlsx tool usage. Gain practical insights into OSINT, offensive security, and red team methodologies to enhance your bug bounty hunting skills.

Syllabus

- Intro
- Stream Intro
- Chat Picking Target
- Subfinder Kick off
- Basic Google Dorking
- Data Manipulation & Review
- Host Command
- httpx Explanation
- ASN Explanation
- Shodan Basics
- Reverse Whois
- Cert Transparency
- ASN With amass
- tlsx Explanation


Taught by

NahamSec

Related Courses

The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Udemy
The Complete Ethical Hacking Course!
Udemy
Ethical Hacking: Footprinting and Reconnaissance
LinkedIn Learning
Applied Ethical Hacking and Rules of Engagement
Udemy
Discovery with ADRecon
Pluralsight