Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Bug Bounty Recon

Master bug bounty reconnaissance! This course covers scope review, subdomain and service enumeration, spidering with OWASP ZAP, and advanced recon techniques like Google dorking, certificate parsing, and GitHub recon.

Lee Allen - Pluralsight course - Bug Bounty Recon
Lee Allen
What you'll learn

Many new bug bounty hunters struggle with effective reconnaissance, which is the foundation for finding vulnerabilities. In this course, Bug Bounty Recon, you’ll learn techniques for bug bounty recon. First, you'll evaluate bug bounty scopes, manually inspect targets, and perform subdomain and service enumeration. Next, you’ll use OWASP ZAP for spidering. Finally, you'll explore advanced recon techniques such as Google dorking, WHOIS lookups, and GitHub recon. By the end of the course, you’ll have the skills to conduct comprehensive recon and prepare for further vulnerability discovery.

Table of contents

About the author
Lee Allen - Pluralsight course - Bug Bounty Recon
Lee Allen

Lee Allen is a penetration tester by trade. Lee has authored four books about penetration testing and has created several Pluralsight courses.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight