CHAPTER FOUR

My Bug Bounty Hunting Methodology

Every bug starts with a question: ‘What if?’

Cybersec with Hemmars
5 min readNov 24, 2024

--

Image generated with AI

INTRODUCTION

I’m a very meticulous person — I love when things are just right. But for a while now, I’ve been asking myself: is there really such a thing as the perfect bug bounty hunting methodology? I mean have you ever wondered the same?

Hey there, welcome back! I’m so glad you’re here again, especially if you read the last chapter. Your support means a lot to me. In this chapter, I’ll be sharing my personal bug bounty hunting methodology — the way I stay organized and get things done. Whether you’re just starting out or want to improve your skills, I hope you’ll find something helpful here. Let’s get into it!

Here is a Friend’s Link for Non-Members.

RECONNAISSANCE AND INFORMATION GATHERING

When I start a bug bounty hunt, I always begin with passive information gathering. This just means I try to find out what information is already out there about the target. I don’t go in without knowing anything. I like to check websites like Crunchbase, W3Tech, and MXToolbox to get an idea of what the website is about and see what info is out there.

--

--

Cybersec with Hemmars
Cybersec with Hemmars

Written by Cybersec with Hemmars

I am a young African boy who loves ethical hacking and playing chess.

No responses yet