Recon for Ethical Hacking Penetration Testing & Bug Bounty

JAC4L

OF Syndicate
Staff member
Contributor
1. Introduction
2. Note Keeping
3. Bug Bounty Recon Introduction
4. Shodan for Bug Bounties
5. Certificate Transparency for Subdomain Enumeration
6. Scope Expansion
7. DNS Enumeration for Bug Bounties
8. CMS Identification
9. Fuzzing
10. Content Disovery
11. WAF Identification
12. Google Dorks
13. Bug Bounty Platforms
14. Mindmaps for Recon & Bug Bounties
15. Next Steps

https://mega.nz/folder/UewD3SpA#9wrVrLz-DEUS9MDRvr96jQ