Request a Demo Contact Us
Bugcrowd Achieves Global CREST Accreditation For Pen Testing
Learn More

Targeting for Bug Bounty Research

 

Learn to find and evaluate many potential targets for a Bugcrowd program. This talk goes beyond DNS-based methods, obvious CLI tools, and clever Google queries to include new and creative resources. Researchers attending this session will walk away with a method for casting their net wide and tricks for separating the wheat from the chaff. Emphasis is placed on producing many results, efficiently gathering and recording them, and professional use that respects program guidelines and avoids common pitfalls.

More resources

Report

Inside the Mind of a Hacker

Read More
Datasheet

Crowdsourced Security in the Public Sector

Read More
Datasheet

Bugcrowd External Attack Surface Management (EASM)

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.