Course Kingdom
HomeCoursesJobsWebinarsBlogSavedAboutTelegram
Course Kingdom

Course Kingdom is an initiative to provide free education in a legit way. We provide free coupons of premium courses from different platforms, webinars, and job opportunities.

Quick Links

  • Home
  • Courses
  • Categories
  • Webinars
  • Jobs
  • Blog
  • Saved Courses
  • About Us
  • FAQ
  • Terms and Conditions
  • Privacy Policy

Social

  • Telegram

© 2026 Course Kingdom. All rights reserved.

Course Kingdom

— Course —

  1. Home
  2. Courses
  3. Recon For Bug Bounty, Penetration Testers & Ethical Hackers
Recon For Bug Bounty, Penetration Testers & Ethical Hackers
IT & Software

22 September, 2024

Maximize your bug bounty hunting with expert-led recon course. Info gathering, tools & techniques covered.

$89.00FREE

Recon For Bug Bounty, Penetration Testers & Ethical Hackers

Welcome to our comprehensive course tailored specifically for website reconnaissance, designed to empower bug bounty hunters, penetration testers, and ethical hackers. Geared towards intermediate-level learners, this course delves deep into all facets of recon on websites.

Explore fundamental concepts such as the essence of reconnaissance and its significance in bug bounty hunting and penetration testing. From subdomain enumeration to URL enumeration, parameter bruteforcing, and even crafting custom recon tools, we cover a broad spectrum of topics crucial for effective website reconnaissance and vulnerability assessment.

Our course meticulously outlines the complete methodology for website reconnaissance, bug bounty hunting, and penetration testing, ensuring a thorough understanding of each step. With videos segmented into easily digestible sections, students can grasp concepts at their own pace.

Access to a wealth of resources awaits in our dedicated resource section, comprising links, PDFs, and payloads utilized throughout the course. Elevate your skills in website reconnaissance and vulnerability assessment with our comprehensive learning experience.


Course Curriculum :

  1. Introduction

    1. Introduction to recon

  2. Subdomain enumeration from tools

    1. Subdomain enumeration #1

    2. Subdomain enumeration #2

    3. Subdomain enumeration #3

    4. Subdomain enumeration #4

    5. Subdomain bruteforcing

    6. Filtering unique domains

    7. Subdomain generator

  3. Subdomain enumeration from websites

    1. Subdomain enumeration from website #1

    2. Subdomain enumeration from website #2

    3. Subdomain enumeration from website #3

    4. Subdomain enumeration from website #4

  4. Filtering live domains

    1. Filtering live domains

  5. URL extraction from the internet

    1. URL extraction from the internet #1

    2. URL extraction from the internet #2

  6. Finding parameters

    1. Finding parameters

    2. Parameter bruteforcer

  7. Finding URL from past

    1. URL from past

  8. Sorting urls

    1. Sorting url for vulnerabilities

  9. Automation for replacing parameters with Payloads

    1. Automation for replacing parameters with Payloads

  10. Footprinting websites ( Website recon )

    1. Whatweb recon

    2. Netcraft

    3. Security headers

    4. Dnsdumpmaster

    5. Whois recon

    6. Mxtoolbox

    7. OSINT

    8. Maltego

  11. Browser addons for recon

    1. wappalyzer

    2. retire.js

    3. shodan

    4. Knoxx

    5. Hack-tools addon

  12. WAF idetification

    1. WAF identification

  13. Subdomain takeover

    1. HostileSubBruteForcer

    2. Sub404

    3. Subjack

  14. Fuzzing (Content-Discovery)

    1. dirb

    2. ffuf

  15. Port scanning

    1. Introduction to nmap

    2. Port specification in nmap

    3. Service and version detection from nmap

    4. Firewall bypass technique

  16. Fast port scanning

    1. nabbu

    2. masscan

  17. Visual recon

    1. Gowitness

  18. Google dorking

    1. Introduction to google dorking

    2. Understnding the URL structure

    3. Syntax of google dorking

    4. Google dorking operators

    5. Google search operators ( Part - 1 )

    6. Google search operators ( Part - 2 )

  19. Google dorking practical

    1. Introduction to practical google dorking

    2. How to find directory listing vulnerabilities ?

    3. How to dork for wordpress plugins and thems ?

    4. How to dork for web servers versions ?

    5. How to dork for application generated system reports ?

    6. Dorking for SQLi

    7. Reading materials for google dorking

  20. Tips for advance google dorking

    1. Tip #1

    2. Tip #2

    3. Tip #3

  21. Shodan dorking

    1. Intro to shodan dorking

    2. Shodan web interface

    3. Shodan search filters

  22. Shodan dorking practical

    1. Finding server

    2. Finding fIles and directories

    3. Finding operating systems

    4. Finding compromised devices and websites

  23. Shodan command line

    1. Introduction to shodan command line

    2. Practical shodan in command line

  24. Github dorking

    1. Introduction to github dorking

    2. Github dorking practical

  25. Vulnerability scanning

    1. Nuclei

    2. Wp-Scan

    3. Scanning with burpsuite

  26. Metasploit for recon

    1. DNS recon using metasploit

    2. Sub-domain enumeration using metasploit

    3. E-mail address finding

  27. Port scanning using metasploit

    1. TCP SYN port scan using metasploit

    2. SSH version detection

    3. FTP version enumeration

    4. MySQL version detection

    5. HTTP enumeration

  28. Payloads for bug bounty hunters

    1. Payloads for bug hunters and enetration testers

  29. How to create tools for recon ?

    1. SSRF finder tool

    2. XSS finding too

    3. URL extractor from javascript files

    4. Full website recon tool

  30. Bonus

    1. Bonus video

Thank you :)

Vivek Pandit


Enroll NowJoin us on Telegram
Udemy Courses TelegramSubscribe on YouTube
Share
← Back to all courses

Related Courses

NEWGiới Thiệu Product Owner trong Mô Hình Agile - Scrum | PSPO
Business

Giới Thiệu Product Owner trong Mô Hình Agile - Scrum | PSPO

3 May, 2026
$89.00FREE
NEWAgile Scrum Product Owner -Kỹ thuật trong Backlog Refinement
Business

Agile Scrum Product Owner -Kỹ thuật trong Backlog Refinement

3 May, 2026
$89.00FREE
NEWProfessional Scrum Product Owner II (PSPO II) Practice |2026
IT & Software

Professional Scrum Product Owner II (PSPO II) Practice |2026

3 May, 2026
$89.00FREE
NEWProfessional Scrum Product Owner I (PSPO I) Practice 2026
IT & Software

Professional Scrum Product Owner I (PSPO I) Practice 2026

2 May, 2026
$89.00FREE
From Sanatan Hindu

Explore Sanatan Hindu Wisdom

Discover articles on Hindu rituals, mantras, festivals, and spiritual practices from sanatanhindu.co.in

Salasar Balaji Ki Aarti Lyrics and Meaning
Aartis & Bhajans

Salasar Balaji Ki Aarti Lyrics and Meaning

Salasar Balaji Ki Aarti with lyrics and meaning, a revered Hindu aarti

3 May, 2026
🙏
Daily Panchang

Daily Panchang — Sunday, 3 May 2026

Hindu Panchang for Sunday, 3 May 2026 — Dwitiya, Vishakha, Vaishakha, VS 2083. Includes Rahu Kaal, Choghadiya, and Abhijit Muhurat timings.

2 May, 2026
The Sacred Significance of Gau Mata in Hindu Dharma
Spiritual Guidance

The Sacred Significance of Gau Mata in Hindu Dharma

Discover the spiritual importance of the cow in Hinduism and its role in rituals and daily life.

2 May, 2026
Understanding the Hindu Calendar and Muhurat Basics
Spiritual Guidance

Understanding the Hindu Calendar and Muhurat Basics

Learn about the Hindu calendar, Muhurat, and its significance in daily life

2 May, 2026
The Significance of Diya and Agarbatti in Hindu Daily Worship
Spiritual Guidance

The Significance of Diya and Agarbatti in Hindu Daily Worship

Discover the spiritual importance of diya and agarbatti in Hindu daily worship

2 May, 2026
The Sacred Significance of Tulsi Plant in Hinduism
Spiritual Guidance

The Sacred Significance of Tulsi Plant in Hinduism

Discover the spiritual importance of Tulsi in Hinduism

2 May, 2026
Visit Sanatan Hindu