About Course

The Bug Hunter’s Recon Methodology is a beginner-friendly recorded course focused entirely on bug bounty reconnaissance. Before exploitation and advanced hacking, every bug hunter must learn how to find assets, understand attack surfaces, and think logically. This course helps you build that foundation by teaching structured recon, not random tool usage. Through practical workflows and real-world examples, you’ll learn how to move from recon data to real vulnerabilities with clarity and confidence.

What Will You Learn?

  • Web Reconnaissance
  • Subdomain Enumeration
  • Domain Enumeration
  • Advanced Content Discovery Techniques
  • Port Scanning
  • How Web Application Firewall Works
  • Finding Origin IP Addresses
  • Using Burpsuite Like a Pro!
  • In-Depth Reconnaissance

Requirements

  • 🔹 No Requirements, This course Start From Basic to Advanced
  • 🔹 Basic IT Skills
  • 🔹 No Linux, programming or hacking knowledge required.
  • 🔹 Computer with a minimum of 4GB ram/memory.
  • 🔹 Operating System: Windows / OS X / Linux.

Course Content

5 sections 38 lectures 2h 44m total length
Section 01: Introduction To The Course
3 lectures 9m
01. Introduction To The Course
Preview 01:47
02. Whoami?
02:53
03. Installing Kali Linux
05:10
Section 02: Manual Recon and Domain & Subdomain Discovery Techniques
13 lectures 51m
04. What Is Domain?
04:33
05: What Is Subdomain?
02:18
06. What Is ASN Number?
02:05
07. How To Find ASN Number Of Any Company
01:50
08. How To Find CIDR Range Of Any Company
03:36
09. Find Live & Dead IP's
05:46
10. What Is Manual Recon?
02:21
11. Subdomain Discovery #1
05:55
12. Subdomain Discovery #2
04:44
13. Subdomain Discovery #3
03:23
14. Subdomain Discovery #4
05:20
15. Subdomain Discovery #5
04:16
16. Subdomain Discovery #6
04:55
Section 03: Discovering Domains Using Certificate Transparency
5 lectures 21m
17. What Is Certificate Transparency?
03:14
18. Discovering Subdomains via Certificate Transparency Logs #1
06:32
19. Discovering Subdomains via Certificate Transparency Logs #2
03:15
20. Discovering Subdomains via Certificate Transparency Logs #3
05:49
21. Discovering Subdomains via Certificate Transparency Logs #4
02:23
Section 04: Subdomain Enumeration Using Automation
7 lectures 40m
22. Automation
01:52
23. Subfinder Installation & API Configuration
09:15
24. Subdomain Enumeration #1
08:25
25. Subdomain Enumeration #2
04:23
26. Subdomain Enumeration #3
05:21
27. Subdomain Enumeration #4
05:52
28. Subdomain Enumeration #5
05:03
Section 05: Shodan
10 lectures 41m
29. Shodan Explained
02:26
30. Shodan Recon #1
02:51
31. Shodan Recon #2
01:38
32. Shodan Recon #3
04:19
33. Shodan Recon #4
04:22
34. Shodan Recon #5
02:35
35. Shodan Recon #6
02:23
36. Shodan Recon #7
05:35
37. Shodan Recon #8
03:56
38. Shodan Recon #9
11:40

Audience

  • 👥 Beginner Bug Hunters
  • 👥 Intermediate Bug Bounty Hunters
  • 👥 Cybersecurity Students