YoVDO

Bug Bounty Recon Basics - Part 1

Offered By: NahamSec via YouTube

Tags

Bug Bounty Courses OSINT (Open Source Intelligence) Courses Data Manipulation Courses Reconnaissance Courses Shodan Courses

Course Description

Overview

Dive into the first part of a comprehensive video course on bug bounty reconnaissance basics. Learn essential techniques including subfinder usage, Google dorking, data manipulation, host command utilization, httpx and ASN explanations, Shodan basics, reverse WHOIS lookups, certificate transparency, and tlsx tool usage. Gain practical insights into OSINT, offensive security, and red team methodologies to enhance your bug bounty hunting skills.

Syllabus

- Intro
- Stream Intro
- Chat Picking Target
- Subfinder Kick off
- Basic Google Dorking
- Data Manipulation & Review
- Host Command
- httpx Explanation
- ASN Explanation
- Shodan Basics
- Reverse Whois
- Cert Transparency
- ASN With amass
- tlsx Explanation


Taught by

NahamSec

Related Courses

The Complete Social Engineering, Phishing, OSINT & Malware
Udemy
Ethical Hacking: Footprinting and Reconnaissance
LinkedIn Learning
Performing OSINT Gathering on Employee Targets
Pluralsight
Hacking Ético desde Dispositivos Android
Udemy
Data Collection and Processing (CTIA Prep)
Pluralsight