image
Information Gathering

Contents

Information Gathering
2
Whois Lookup
PREVIEW6m 32s
3
4
5
Firewalls
8m 22s

The course is part of this learning path

Course Introduction
Difficulty
Intermediate
Duration
32m
Students
27
Ratings
5/5
starstarstarstarstar
Description

Now that you know all about the fundamentals of bug bounty hunting and web pen-testing, we're now going to look at the information gathering techniques that you can carry out as reconnaissance on the website you're planning to attack.

Transcript

Hi, within this section, we're going to focus on information gathering. As I said before, this should be our first step actually, when we go into a web pen-testing or bug bounty hunting. So, this is the first thing we should do. But it's easier for you to learn it at this point, now it would make sense to learn about this stuff, because beforehand, even if you understand what's going on in this section, then you wouldn't understand how to use those information in your web pen-testing. Now, you know all about the fundamentals of bug bounty hunting and web pen-testing, then I believe this would be a good opportunity for you to enhance your skills by using this information-gathering section as well. Now, if you're ready, let's get started.

About the Author
Students
1675
Courses
55
Learning Paths
3

Atil is an instructor at Bogazici University, where he graduated back in 2010. He is also co-founder of Academy Club, which provides training, and Pera Games, which operates in the mobile gaming industry.