Methodology 2025
Bug Bounty Hunting Methodology 2025
Welcome to the Bug Bounty Methodology 2025 Edition! This methodology is a basic guide to help you kickstart your bug bounty journey. It outlines the essential steps to navigate your target effectively, but the real challenge lies in identifying high-impact vulnerabilities through your own skills and creativity. This methodology will be updated regularly as new and interesting techniques emerge to enhance your testing process. ## 📜 Table of Contents
1. Reconnaissance
Subdomain Enumeration & Initial Scanning
2. Discovery
HTTP Probing & Asset Discovery
3. Enumeration
Advanced Techniques & Parameter Discovery
4. Testing
Vulnerability Assessment
5. Two-Eye Approach
What is that?
6. POC Creation
Documentation & Evidence
7. Reporting
Final Documentation
1. Reconnaissance and Subdomain Enumeration
1.1 Passive Subdomain Enumeration
🛠️Tools: Subfinder, Amass, CRTSH, Github-Search
Subfinder
Amass (Passive Mode)
CRT.sh Query
Github Dorking
Results Combination
1.2 Active Subdomain Enumeration
🛠️Tools: MassDNS, Shuffledns, DNSX, SubBrute, FFuF
MassDNS
Shuffledns
DNSX Resolution
SubBrute
FFuF Subdomain
1.3 Handling Specific (Non-Wildcard) Targets
🛠️Tools: GAU, Waybackurls, Katana, Hakrawler
GAU
Waybackurls
Katana
Hakrawler
Additional Advanced Techniques
🛠️Tools: CloudEnum, AWSBucketDump, S3Scanner
Reverse DNS
ASN Enumeration
Cloud Asset Enumeration
Results Validation
2. Discovery and Probing
2.1 HTTP Probing
HTTPX Probing
Custom Filtering
2.2 JavaScript Analysis
🛠️Tools: LinkFinder, subjs, JSFinder, GF
JS Extraction
LinkFinder Analysis
Sensitive Pattern Search
API Key Validation
2.3 Advanced Google Dorking
🛠️Tools: GitDorker
Automated Dorking
Admin/Login Files
Config Files
Public Keys
2.4 URL Discovery
🛠️Tools: Katana, Gospider, Hakrawler
Katana Crawling
Gospider
Hakrawler
2.5 Archive Enumeration
🛠️Tools: GAU, Waybackurls, ParamSpider
Archive URL Collection
Parameter Extraction
3. Advanced Enumeration Techniques
3.1 Parameter Discovery
🛠️Tools: Arjun, ParamSpider, FFuF
Arjun Parameter Discovery
ParamSpider Web Parameters
FFuF Parameter Bruteforce
3.2 Cloud Asset Enumeration
🛠️Tools: CloudEnum, AWSBucketDump, S3Scanner
Cloud Bucket Enumeration
S3 Bucket Access Test
S3 Bucket Content Dump
3.3 Content Discovery
🛠️Tools: Feroxbuster, FFuF, Dirsearch
Feroxbuster
Dirsearch
FFuF Recursive
3.4 API Enumeration
🛠️Tools: Kiterunner, Postman, Burp Suite
Kiterunner
3.5 ASN Mapping
🛠️Tools: Amass, Shodan, Censys
ASN Lookup
Shodan Enumeration
Censys Asset Search
4. Vulnerability Testing
4.1 High-Priority Vulnerabilities
🐞CSRF Testing
🐞LFI Testing
🐞RCE Testing
🐞SQLi Testing
🐞Sensitive Data Search
🐞Open Redirect Test
5. The "Two-Eye" Approach 👀
First Eye: Focus on testing every gathered subdomain, endpoint, or parameter for common vulnerabilities.
Second Eye: Identify “interesting” findings like exposed credentials, forgotten subdomains, or admin panels.
Actionable Steps:
If a vulnerability is identified, create a proof of concept (POC) and test its impact.
If no vulnerabilities are found, pivot to deeper testing on unique subdomains or endpoints.
6. Proof of Concept (POC) Creation
🎥Video POC
Demonstrate vulnerabilities in action using screen recording tools like Greenshot or OBS Studio.
📸Screenshot POC
Capture clear screenshots with annotations to explain each step.
🛠️Tool: Greenshot.
7. Reporting
📝Report Structure
Executive Summary
Target Scope
Testing Timeline
Key Findings Summary
Risk Ratings
Technical Details
Vulnerability Title
Severity Rating
Affected Components
Technical Description
Steps to Reproduce
Impact Analysis
Supporting Evidence (POC)
Remediation
Detailed Recommendations
Mitigation Steps
Additional Security Controls
References & Resources
Supporting Materials
Video Demonstrations
Screenshots & Annotations
HTTP Request/Response Logs
Code Snippets
Timeline of Discovery
Best Practices
Write clear, concise descriptions
Include detailed reproduction steps
Provide actionable remediation advice
Support findings with evidence
Use professional formatting
Highlight business impact
Include verification steps
Report Format
Last updated