top of page

Bug Bounty Recon




1.3 Hour

About the Course

A course on Bug Bounty Recon would cover the various techniques and methods used to identify potential vulnerabilities in a target system. The course would be divided into two sections: medium scope recon and small scope recon.

In the medium scope recon section, students would learn about the various tools and techniques used to gather information about a target system having medium scope which is (*, such as passive reconnaissance and active reconnaissance. They would also learn about the different types of data that can be collected, including information about the target's infrastructure, web applications, and social media presence.

In the small scope recon section, students will learn to perform recon on smal scopes which is a url ( .They would focus on more specific and targeted reconnaissance techniques. They would learn about the use of specialized tools, such as vulnerability scanners and penetration testing frameworks, to identify specific vulnerabilities in a target system. They would also learn about the importance of identifying and exploiting these vulnerabilities in a responsible and ethical manner.

Throughout the course, students would have the opportunity to apply what they have learned through hands-on exercises and real-world scenarios. By the end of the course, students would be well-versed in the tools and techniques used in bug bounty recon and be able to conduct effective and efficient reconnaissance on their own.

Your Instructor

Camilla Jones

Camilla Jones

Nitin Yadav is a student of B.Tech computer science. A web application security researcher and penetration tester from India. He is a computer researcher and ethical hacker. He make ethical hacking videos, courses and writing blogs.

bottom of page