InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Ott3rly

I write stories about Bug Bounty Hunting and security research.

Responses (3)

Write a response

Bug hunters are treated as beggars by most of these so called generous bug hunting programs but we are fking securing their company but no respect. If these ethical hackers aka bug bounty hunters become unethical then no one would even dare to keep…

--

Really!! Burning Truths

--

Another key point I would add, programs that only include the front end into the scope and leave the apis and other subdomains out. This could be time consuming since you expend time and effort finding a bug just to realize the data layer is out of scope.

--