CTF & Bug Bounty » Bug Bounty » Bug Bounty Cheatsheets
Bug Bounty methodology can be split into 2 main categories:
- Reconnaissance: discovering the assets of our target (IP, subdomains, services, routes, parameters, logic, tokens, API, code, etc.). Most important part.
- Exploitation: trying to exploit the services that we discovered in the previous step. Without a very clear comprehension of those services, we’re going to lose our time.
Therefore, you can find the following cheatsheets on pentestguides.com:
.
Disclaimer
All content published on this website is for educational purposes only.
The techniques, tools, and methodologies described here are intended to be used only on systems you own or have explicit permission to test.
I do not encourage or take responsibility for any illegal use of the information provided.

