When coming across a *.target.com scope, it’s always a good idea to seek the road less travelled. Exotic and forgotten applications running on strangely named subdomains will quickly lead to uncovering critical vulnerabilities and often high payouts. Discovering such subdomains is a critical skill for today’s bug hunter and choosing the right techniques and tools is paramount.
Posts by Topic
Bug Bounty Management Bugcrowd News Bug Hunter Methodology Company Resources Conferences & Events Customer Case Study Cybersecurity News Guest Blogs Product Updates Program Launches Program Management Program Updates Researcher Resources Researcher Spotlight Success Stories Thought Leadership Vulnerabilities Vulnerability Disclosure Webinar Recap Winner's Circle
Posts By Author
Abigail Nguy Alyssa Habing Ashish Gupta Athena Peterson Barnett Klane Bugcrowd Bugcrowd Product Marketing Bugcrowd Researcher Success Casey Ellis Chloe Brown Daniel Trauner David Baker Grant McCracken Guest Post Jason Haddix JP Villanueva Kaila Pollart Kaushik Srinivas Keith Hoodlet Lauren Craigie Luke Stephens Michael Chung Michael Hamel Michael Skelton Omar Carmical Parag Baxi Pawel Lesniewski Rachel Novak Rick Beattie Ryan Black Shpend Kurtishaj Tim Sandberg