How to Easily Earn a $200 Bounty

4 months ago 30
BOOK THIS SPACE FOR AD
ARTICLE AD

Mu1berry

Step 1: Check If the Target’s Rules Include Email Bombing Vulnerabilities

First, before you start testing, be sure to read and understand the target platform’s bug bounty program rules. Different platforms have different acceptance criteria and reward policies for different types of vulnerabilities. Email bombing is a common type of vulnerability, but not all platforms accept this kind of report. Therefore, make sure the target platform explicitly lists the acceptance criteria and reward amounts for email bombing vulnerabilities.

Key Points:

• Carefully read the target platform’s bug bounty program rules

• Confirm if email bombing vulnerabilities are within the scope of acceptance

• Understand the reward amount and reporting standards

Step 2: Find All Email-Related Functional Points

Next, you need to find all the functional points on the target platform that involve email. These usually include registration, login, password reset, notification emails, etc. Finding these functional points is to identify where vulnerabilities might exist.

Methods:

• Register a new account on the target platform and observe if a confirmation email is sent

Read Entire Article