Bug Bounty Methodology Checklist for Web Applications (B2B Apps)
1. Reconnaissance & Initial Enumeration
- Subdomain Enumeration:
- Use tools like
Sublist3r
,Amass
, andAssetfinder
. - Test discovered subdomains for HTTP/HTTPS access (
httpx
,httprobe
). - Check for wildcard DNS using
dig
ornslookup
. - Web Server Fingerprinting:
- Identify web servers (e.g., Nginx, Apache) using
WhatWeb
orWappalyzer
. - Analyze technologies and frameworks in use (React, Angular, Ruby on Rails).
- Enumerate Endpoints:
- Use
FFUF
orDirbuster
for directory brute-forcing with custom wordlists. - Focus on hidden endpoints (
robots.txt
,.well-known/
, backups, logs). - Manually explore web functionality for unconventional endpoints.
- Review Metadata:
- Inspect headers for sensitive data (
Burp Suite
, browser dev tools). - Analyze JavaScript files for exposed credentials, API endpoints, or logic.
2. Authentication and Session Management
- Username Enumeration:
- Test login forms and password reset…