🪜Phases of Bug Hunting

The phases of bug hunting typically involve the following steps:

  1. Reconnaissance: In this phase, the bug hunter gathers information about the target website or application, such as its structure, technologies used, and any known vulnerabilities.

  2. Scanning: In this phase, the bug hunter uses automated tools to identify potential security vulnerabilities in the target website or application.

  3. Testing: In this phase, the bug hunter manually tests the identified potential security vulnerabilities to confirm their existence and assess their severity.

  4. Reporting: In this phase, the bug hunter reports the confirmed security vulnerability to the organization, including details on how it can be exploited and how it can be fixed.

  5. Verification: In this phase, the organization verifies the reported security vulnerability and works to fix it.

  6. Reward: In this phase, the bug hunter is rewarded for their efforts, typically in the form of money, swag, or recognition.

All those phases are repeated as needed until all known security vulnerabilities have been identified and fixed.

Last updated