Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Bug Bounty Recon

Master bug bounty reconnaissance! This course covers scope review, subdomain and service enumeration, spidering with OWASP ZAP, and advanced recon techniques like Google dorking, certificate parsing, and GitHub recon.

Lee Allen - Pluralsight course - Bug Bounty Recon
by Lee Allen

What you'll learn

Many new bug bounty hunters struggle with effective reconnaissance, which is the foundation for finding vulnerabilities. In this course, Bug Bounty Recon, you’ll learn techniques for bug bounty recon. First, you'll evaluate bug bounty scopes, manually inspect targets, and perform subdomain and service enumeration. Next, you’ll use OWASP ZAP for spidering. Finally, you'll explore advanced recon techniques such as Google dorking, WHOIS lookups, and GitHub recon. By the end of the course, you’ll have the skills to conduct comprehensive recon and prepare for further vulnerability discovery.

Table of contents

About the author

Lee Allen - Pluralsight course - Bug Bounty Recon
Lee Allen

Lee Allen is a penetration tester by trade. Lee has authored four books about penetration testing and has created several Pluralsight courses.

More Courses by Lee