Request a Demo Contact Us
Check out our new MSP offering for scalable pentests
Learn More

Targeting for Bug Bounty Research

 

Learn to find and evaluate many potential targets for a Bugcrowd program. This talk goes beyond DNS-based methods, obvious CLI tools, and clever Google queries to include new and creative resources. Researchers attending this session will walk away with a method for casting their net wide and tricks for separating the wheat from the chaff. Emphasis is placed on producing many results, efficiently gathering and recording them, and professional use that respects program guidelines and avoids common pitfalls.

More resources

Guide

Guide to Working with Hackers

Read More
Guide

Ultimate Guide to Crowdsourced Security for SaaS Companies

Read More
eBooks

7 Steps for Implementing a Vulnerability Disclosure Program

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.