When coming across a *.target.com scope, it’s always a good idea to seek the road less travelled. Exotic and forgotten applications running on strangely named subdomains will quickly lead to uncovering critical vulnerabilities and often high payouts. Discovering such subdomains is a critical skill for today’s bug hunter and choosing the right techniques and tools is paramount.
Posts by Topic
Bug Bounty Management Bugcrowd News Bug Hunter Methodology Company Resources Conferences & Events Cybersecurity News Guest Blogs Product Updates Program Launches Program Management Program Updates Researcher Resources Researcher Spotlight Success Stories Thought Leadership Vulnerabilities Vulnerability Disclosure Winner's Circle
Posts By Author
Abby Mulligan Abigail Nguy Alyssa Habing Ariana Ling Ashish Gupta Barnett Klane Bugcrowd Casey Ellis Chloe Brown Daniel Trauner David Baker Grant McCracken Jason Haddix Jason Jung Jonathan Gohstand JP Villanueva Kaila Pollart Kaushik Srinivas Keith Hoodlet Lauren Craigie Michael Chung Michelle Dailey Parag Baxi Pawel Lesniewski Rick Beattie Ryan Black Sam Houston Shpend Kurtishaj Tim Sandberg Travis Andrade