Targeting for Bug Bounty Research

 

Learn to find and evaluate many potential targets for a Bugcrowd program. This talk goes beyond DNS-based methods, obvious CLI tools, and clever Google queries to include new and creative resources. Researchers attending this session will walk away with a method for casting their net wide and tricks for separating the wheat from the chaff. Emphasis is placed on producing many results, efficiently gathering and recording them, and professional use that respects program guidelines and avoids common pitfalls.

More resources

Guide

Bugcrowd for Government

Read More
eBooks

5 Reasons to Choose Bugcrowd

Read More
Guide

A guide to major cybersecurity compliance requirements

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.