My bug bounty methodology and how I approach a target for the first time

My bug bounty methodology and how I approach a target for the first time

Welcome again to the Hack for Fun and Profit podcast, where we explore topics related to cyber security and bug bounty hunting. Last time, I showed you the best resources I use to stay up to date in bug bounty hunting. Today, I will share with you my bug bounty methodology when I approach a target for the first time. This is going to be divided into several sections. First, I will show how I choose a bug bounty program. Then, I will dive into how I enumerate the assets. From there, I will explain how I pick a web application and how I test it. Finally, I will evaluate this bug bounty methodology by enumerating its pros and cons so that you know exactly what to expect from it. There are plenty of bug bounty tips and tricks along the way, so make sure to stick around until the end.


Learn the OWASP Top 10 on the blog: https://thehackerish.com

Watch our videos on Youtube: https://www.youtube.com/channel/UCIXot2vRgeM5alhAlpTbhQA

Follow us on Twitter: https://twitter.com/thehackerish

Avsnitt(11)

Certified Red Team Operator Review

Certified Red Team Operator Review

In this episode, I will give you my honest review of CRTO (certified red team operator certification) from Zeropoint Security. Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-1...

29 Dec 202111min

JavaScript Enumeration for bug bounty hunters

JavaScript Enumeration for bug bounty hunters

JavaScript Enumeration is a critical skill to have if you want to level up your penetration testing or bug bounty hunting game. Yet, not everyone does it, partly because it is a boring exercise or i...

24 Dec 202010min

OSCP Certification: All you need to know

OSCP Certification: All you need to know

Hello ethical hackers! In this episode, you will learn everything related to OSCP certification. What is OSCP? Why is it a strong certification? What sets it apart? What are the requirements? How to...

30 Juli 202014min

From a lame SSRF to a full $4000 RCE

From a lame SSRF to a full $4000 RCE

Hello ethical hackers and bug bounty hunters! Welcome to this bug bounty write-up where I show you how I found a Server-Side Request Forgery vulnerability (SSRF). Then, I will explain how I was able...

5 Juli 20209min

Hacking a new web application from start to finish

Hacking a new web application from start to finish

Hello ethical hackers and bug bounty hunters! I’ve recently conducted a successful penetration testing against a web application built using Google Web Toolkit, and I want to share with you the proc...

4 Juni 202015min

Bug bounty tools you should start using!

Bug bounty tools you should start using!

Hello ethical hackers and welcome to the world of hacking and bug bounty hunting. Today, I will share the tools I use to gather open source intelligence and perform subdomain enumeration. Every crafts...

27 Maj 202013min

This is how you write bug bounty reports that stand out!

This is how you write bug bounty reports that stand out!

Hello dear ethical hackers and welcome to this new article about bug bounty hunting. In this episode, you will discover my report template and learn how you can write outstanding bug bounty reports wh...

7 Maj 202015min

Populärt inom Utbildning

historiepodden-se
rss-bara-en-till-om-missbruk-medberoende-2
det-skaver
harrisons-dramatiska-historia
nu-blir-det-historia
rss-viktmedicinpodden
alska-oss
sektledare
johannes-hansen-podcast
roda-vita-rosen
not-fanny-anymore
allt-du-velat-veta
rss-sjalsligt-avkladd
rikatillsammans-om-privatekonomi-rikedom-i-livet
sa-in-i-sjalen
polisutbildningspodden
i-vantan-pa-katastrofen
rss-max-tant-med-max-villman
rss-om-vi-ska-vara-arliga
rss-relationsrevolutionen