BOOK THIS SPACE FOR AD
ARTICLE ADStep 1: Check If the Target’s Rules Include Email Bombing Vulnerabilities
First, before you start testing, be sure to read and understand the target platform’s bug bounty program rules. Different platforms have different acceptance criteria and reward policies for different types of vulnerabilities. Email bombing is a common type of vulnerability, but not all platforms accept this kind of report. Therefore, make sure the target platform explicitly lists the acceptance criteria and reward amounts for email bombing vulnerabilities.
Key Points:
• Carefully read the target platform’s bug bounty program rules
• Confirm if email bombing vulnerabilities are within the scope of acceptance
• Understand the reward amount and reporting standards
Step 2: Find All Email-Related Functional Points
Next, you need to find all the functional points on the target platform that involve email. These usually include registration, login, password reset, notification emails, etc. Finding these functional points is to identify where vulnerabilities might exist.
Methods:
• Register a new account on the target platform and observe if a confirmation email is sent