Bug Bounty Methodology — Bug Hunting Checklist (PART-1)

1. Recon on Wildcard Domain — Tools required:

Recon Tools Required

2. Scanning:

Automated & Manual Scanning Tools

3. Manual Checking:


4. Information Gathering:

Information Gathering Phase

5. Configuration Management:

Configuration Management

6. Secure Transmission:

Secure Transmission

7. Authentication:

Authentication Vulnerabilities Checklist

8. Session Management:

Session Management Checklist



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store