CWP panel
Bug bounty methodology: Single target recon (1/3)
Bug bounty methodology: Single target recon (1/3)
#Bug #bounty #methodology #Single #target #recon
“The XSS rat”
Let’s create a bug bounty checklist 🙂 well start with recon and move on to exploitation in the next video.
Checklist
———————-
Map the app:
– burp pro content discovery
– gobuster
– manual browsing to fill the site map
– review the JS files
– run nikto
Identify the…
source
To see the full content, share this page by clicking one of the buttons below |