When coming across a *.target.com scope, it’s always a good idea to seek the road less travelled. Exotic and forgotten applications running on strangely named subdomains will quickly lead to uncovering critical vulnerabilities and often high payouts. Discovering such subdomains is a critical skill for today’s bug hunter and choosing the right techniques and tools is paramount.
Posts by Topic
Bug Bounty Management Bugcrowd News Bug Hunter Methodology Company Resources Conferences & Events Cybersecurity News Guest Blogs Product Updates Program Launches Program Management Program Updates Researcher Resources Researcher Spotlight Success Stories Thought Leadership Vulnerabilities Vulnerability Disclosure Winner's Circle
Posts By Author
Abigail Nguy Alyssa Habing Ashish Gupta Barnett Klane Bugcrowd Bugcrowd Product Marketing Casey Ellis Chloe Brown Daniel Trauner David Baker Grant McCracken Guest Post Jason Haddix JP Villanueva Kaila Pollart Kaushik Srinivas Keith Hoodlet Lauren Craigie Michael Chung Michael Skelton Omar Carmical Parag Baxi Pawel Lesniewski Rick Beattie Ryan Black Sam Houston Shpend Kurtishaj Tim Sandberg