CWP panel

Bug bounty methodology: Single target recon (1/3)

Bug bounty methodology: Single target recon (1/3)

#Bug #bounty #methodology #Single #target #recon

“The XSS rat”

Let’s create a bug bounty checklist 🙂 well start with recon and move on to exploitation in the next video.

Checklist
———————-
Map the app:
– burp pro content discovery
– gobuster
– manual browsing to fill the site map
– review the JS files
– run nikto

Identify the…

source

 

To see the full content, share this page by clicking one of the buttons below

Related Articles

Leave a Reply