Methodology 2025

Bug Bounty Hunting Methodology 2025

Welcome to the Bug Bounty Methodology 2025 Edition! This methodology is a basic guide to help you kickstart your bug bounty journey. It outlines the essential steps to navigate your target effectively, but the real challenge lies in identifying high-impact vulnerabilities through your own skills and creativity. This methodology will be updated regularly as new and interesting techniques emerge to enhance your testing process. ## 📜 Table of Contents

Section
Description

1. Reconnaissance

Subdomain Enumeration & Initial Scanning

2. Discovery

HTTP Probing & Asset Discovery

3. Enumeration

Advanced Techniques & Parameter Discovery

4. Testing

Vulnerability Assessment

5. Two-Eye Approach

What is that?

6. POC Creation

Documentation & Evidence

7. Reporting

Final Documentation


1. Reconnaissance and Subdomain Enumeration

1.1 Passive Subdomain Enumeration

🛠️Tools: Subfinder, Amass, CRTSH, Github-Search

Subfinder

subfinder -d target.com -silent -all -recursive -o subfinder_subs.txt

Amass (Passive Mode)

CRT.sh Query

Github Dorking

Results Combination

1.2 Active Subdomain Enumeration

🛠️Tools: MassDNS, Shuffledns, DNSX, SubBrute, FFuF

MassDNS

Shuffledns

DNSX Resolution

SubBrute

FFuF Subdomain

1.3 Handling Specific (Non-Wildcard) Targets

🛠️Tools: GAU, Waybackurls, Katana, Hakrawler

GAU

Waybackurls

Katana

Hakrawler

Additional Advanced Techniques

🛠️Tools: CloudEnum, AWSBucketDump, S3Scanner

Reverse DNS

ASN Enumeration

Cloud Asset Enumeration

Results Validation


2. Discovery and Probing

2.1 HTTP Probing

🛠️Tools: httpx, httprobe

HTTPX Probing

Custom Filtering

2.2 JavaScript Analysis

🛠️Tools: LinkFinder, subjs, JSFinder, GF

JS Extraction

LinkFinder Analysis

Sensitive Pattern Search

API Key Validation

2.3 Advanced Google Dorking

🛠️Tools: GitDorker

Automated Dorking

Admin/Login Files

Config Files

Public Keys

2.4 URL Discovery

🛠️Tools: Katana, Gospider, Hakrawler

Katana Crawling

Gospider

Hakrawler

2.5 Archive Enumeration

🛠️Tools: GAU, Waybackurls, ParamSpider

Archive URL Collection

Parameter Extraction


3. Advanced Enumeration Techniques

3.1 Parameter Discovery

🛠️Tools: Arjun, ParamSpider, FFuF

Arjun Parameter Discovery

ParamSpider Web Parameters

FFuF Parameter Bruteforce

3.2 Cloud Asset Enumeration

🛠️Tools: CloudEnum, AWSBucketDump, S3Scanner

Cloud Bucket Enumeration

S3 Bucket Access Test

S3 Bucket Content Dump

3.3 Content Discovery

🛠️Tools: Feroxbuster, FFuF, Dirsearch

Feroxbuster

Dirsearch

FFuF Recursive

3.4 API Enumeration

🛠️Tools: Kiterunner, Postman, Burp Suite

Kiterunner

3.5 ASN Mapping

🛠️Tools: Amass, Shodan, Censys

ASN Lookup

Shodan Enumeration

Censys Asset Search


4. Vulnerability Testing

4.1 High-Priority Vulnerabilities

🐞CSRF Testing

🐞LFI Testing

🐞RCE Testing

🐞SQLi Testing

🐞Sensitive Data Search

🐞Open Redirect Test


5. The "Two-Eye" Approach 👀

  1. First Eye: Focus on testing every gathered subdomain, endpoint, or parameter for common vulnerabilities.

  2. Second Eye: Identify “interesting” findings like exposed credentials, forgotten subdomains, or admin panels.

Actionable Steps:

  • If a vulnerability is identified, create a proof of concept (POC) and test its impact.

  • If no vulnerabilities are found, pivot to deeper testing on unique subdomains or endpoints.


6. Proof of Concept (POC) Creation

🎥Video POC

Demonstrate vulnerabilities in action using screen recording tools like Greenshot or OBS Studio.

📸Screenshot POC

Capture clear screenshots with annotations to explain each step.

  • 🛠️Tool: Greenshot.


7. Reporting

📝Report Structure

  1. Executive Summary

    • Target Scope

    • Testing Timeline

    • Key Findings Summary

    • Risk Ratings

  2. Technical Details

    • Vulnerability Title

    • Severity Rating

    • Affected Components

    • Technical Description

    • Steps to Reproduce

    • Impact Analysis

    • Supporting Evidence (POC)

  3. Remediation

    • Detailed Recommendations

    • Mitigation Steps

    • Additional Security Controls

    • References & Resources

  4. Supporting Materials

    • Video Demonstrations

    • Screenshots & Annotations

    • HTTP Request/Response Logs

    • Code Snippets

    • Timeline of Discovery

Best Practices

  • Write clear, concise descriptions

  • Include detailed reproduction steps

  • Provide actionable remediation advice

  • Support findings with evidence

  • Use professional formatting

  • Highlight business impact

  • Include verification steps

Report Format


Last updated