Your checklists (
0
)
AI Checklist Generator
From the makers of
Manifestly Checklists
Sign in
Email address
Email me a magic link
Home
> Bug bounty
Bug bounty
Preparation Phase
Define the scope of the bug bounty program.
Identify the targets (web applications, APIs, etc.).
Review the rules of engagement and guidelines.
Set up a communication channel for reporting bugs.
Choose a platform for managing submissions (e.g., HackerOne, Bugcrowd).
Research Phase
Gather information about the target (reconnaissance).
Identify technologies used (web servers, frameworks, etc.).
Look for publicly available information (e.g., GitHub, social media).
Analyze previous reports and known vulnerabilities.
Testing Phase
Perform automated scans for common vulnerabilities.
Conduct manual testing for complex issues.
Test for OWASP Top Ten vulnerabilities.
Document findings meticulously with steps to reproduce.
Reporting Phase
Prioritize reported vulnerabilities based on severity.
Write a clear and concise report for each finding.
Include evidence (screenshots, logs, etc.) in the report.
Submit reports through the designated platform or communication channel.
Follow-up Phase
Engage with the program's team for clarification if needed.
Be prepared to answer questions regarding the findings.
Track the status of reported vulnerabilities.
Provide additional information if requested.
Post-Engagement Phase
Review and analyze the overall engagement experience.
Gather feedback from the program’s team.
Update personal knowledge and skills based on lessons learned.
Celebrate successes and recognize any rewards received.
Download CSV
Download JSON
Download Markdown
Use in Manifestly