YoVDO

Bug Bounty Recon Basics - Part 1

Offered By: NahamSec via YouTube

Tags

Bug Bounty Courses OSINT (Open Source Intelligence) Courses Data Manipulation Courses Reconnaissance Courses Shodan Courses

Course Description

Overview

Dive into the first part of a comprehensive video course on bug bounty reconnaissance basics. Learn essential techniques including subfinder usage, Google dorking, data manipulation, host command utilization, httpx and ASN explanations, Shodan basics, reverse WHOIS lookups, certificate transparency, and tlsx tool usage. Gain practical insights into OSINT, offensive security, and red team methodologies to enhance your bug bounty hunting skills.

Syllabus

- Intro
- Stream Intro
- Chat Picking Target
- Subfinder Kick off
- Basic Google Dorking
- Data Manipulation & Review
- Host Command
- httpx Explanation
- ASN Explanation
- Shodan Basics
- Reverse Whois
- Cert Transparency
- ASN With amass
- tlsx Explanation


Taught by

NahamSec

Related Courses

Excel 2010
Miríadax
Intro to Data Science
Udacity
Data Manipulation at Scale: Systems and Algorithms
University of Washington via Coursera
Statistical Computing with R - a gentle introduction
University College London via Independent
Introducción a Data Science: Programación Estadística con R
Universidad Nacional Autónoma de México via Coursera