BOOK THIS SPACE FOR AD
ARTICLE ADPhoto by Sigmund on Unsplash
When we started bug bounty, we always ask questions like, how to approach a target? Should I do recon or should I go right in testing its function? I once spent most of my time finding out the answer. I tried read Hacker’s handbook, read report, watch Jason Haddix’s video about methodology, and ping some successful hackers in Twitter to find the answer.