Summary

  • A common mistake for those new to ethical or bug bounty hacking is to assume that success lies in running popular automated scans and copying code from well-known sources.
  • While these tools are useful, they are only one part of the picture and copying techniques from publicly available sources means they are likely to be widely known and patched.
  • Every target is different and needs to be approached with a fresh mindset, which means researching and developing new reconnaissance techniques for each new target.
  • This makes it more likely that gold (high-value vulnerabilities) can be found where others have not looked.
  • It also means that a bounty hunter’s toolkit is constantly evolving which broadens their range of skills.

By Akash Ghosh

Original Article