Bug Bounty for Beginners - Reference Little Book
  • 📘Little Bug Bounty Book
  • ❓What is Bug Bounty
  • 🎯Bug Bounty Platforms
  • 🪜Phases of Bug Hunting
  • ⚠️Required Knowledge
  • 📣So, where do I start?
    • Network Security
    • Application Security
    • Mobile Security
    • Code Review and SAST
    • OWASP?
  • 🔎Reconnaissance Phase
    • Footprinting
      • OSINT
      • Google Dorks
      • Censys
      • Shodan
    • Subdomain Enumeration
      • Amass
      • Subfinder
      • Assetfinder
      • Aquatone
      • DNSrecon
      • DNSEnum
      • HTTPX
      • ReconFTW
    • Fingerprint
      • Nmap
      • Rustscan
      • Masscan
  • 🐞Scanning Phase
    • OpenVAS
    • Nuclei
    • OWASP Zap
    • NMAP
    • Looking for Parameters with Katana
    • Searching for XSS
    • SQL Injection (SQLi)
  • ♨️Testing Phase
    • Manual Validation
    • Severity Assessment in Vulnerability Testing
    • Exploitation Phase
    • Documentation of Findings
  • 📖Reporting Phase
Powered by GitBook
On this page

Phases of Bug Hunting

The phases of bug hunting typically involve the following steps:

  1. Reconnaissance: In this phase, the bug hunter gathers information about the target website or application, such as its structure, technologies used, and any known vulnerabilities.

  2. Scanning: In this phase, the bug hunter uses automated tools to identify potential security vulnerabilities in the target website or application.

  3. Testing: In this phase, the bug hunter manually tests the identified potential security vulnerabilities to confirm their existence and assess their severity.

  4. Reporting: In this phase, the bug hunter reports the confirmed security vulnerability to the organization, including details on how it can be exploited and how it can be fixed.

  5. Verification: In this phase, the organization verifies the reported security vulnerability and works to fix it.

  6. Reward: In this phase, the bug hunter is rewarded for their efforts, typically in the form of money, swag, or recognition.

All those phases are repeated as needed until all known security vulnerabilities have been identified and fixed.

PreviousBug Bounty PlatformsNextRequired Knowledge

Last updated 2 years ago

🪜