Targeting for Bug Bounty Research

 

Learn to find and evaluate many potential targets for a Bugcrowd program. This talk goes beyond DNS-based methods, obvious CLI tools, and clever Google queries to include new and creative resources. Researchers attending this session will walk away with a method for casting their net wide and tricks for separating the wheat from the chaff. Emphasis is placed on producing many results, efficiently gathering and recording them, and professional use that respects program guidelines and avoids common pitfalls.

More resources

Guide

Ultimate Guide to Crowdsourced Security for Financial Services Organizations

Read More
eBooks

Get to know our pentesters

Read More
eBooks

Get to know the Crowd

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.