Logo YesWeHack
Blog
LoginContact Us

Learn Bug Bounty

  1. Blog
  2. Learn Bug Bounty
Bug Bounty recon roundup

Recon series recap: The ultimate guide to Bug Bounty reconnaissance and footprinting

Read More ->
YesWeCaido: a new Caido plugin for tracking Bug Bounty Programs

YesWeCaido: a new Caido plugin for tracking Bug Bounty Programs

Read More ->
Recon Series #6: Excavating hidden artifacts with Wayback Machine and other web-archive tools

Recon Series #6: Excavating hidden artifacts with Wayback Machine and other web-archive tools

Read More ->
Bug Bounty recon series on information gathering with search engines – aka Google Dorking – which is illustrated with a magnifying glass zooming in on a web browser.

Recon series #5: A hacker’s guide to Google dorking

Read More ->
Practical guide to path traversal and arbitrary file read attacks

Beyond ‘../../’ - a practical guide to path traversal and arbitrary file read attacks

Read More ->
Port scanning techniques for finding hidden services

Recon series #4: Port scanning – uncovering attack vectors by revealing open ports and hidden services

Read More ->
Bug Bounty recon series on information gathering with search engines – aka Google Dorking – which is illustrated with a magnifying glass zooming in on a web browser.

Recon series #5: A hacker’s guide to Google dorking

HTTP header exploitation

HTTP header hacks: basic and advanced exploit techniques explored

Read More ->
GraphQL exploitation

Hacking GraphQL endpoints with introspection, query, mutation, batching attacks

Read More ->
The art of payload obfuscation

The art of payload obfuscation: how to mask malicious scripts and bypass defence mechanisms

Read More ->
HTTP header exploitation

HTTP header hacks: basic and advanced exploit techniques explored

server-side template injection

Limitations are just an illusion – advanced server-side template exploitation with RCE everywhere

Read More ->
HTTP fingerprinting in web applications: article number three in YesWeHack’s bug bounty recon series

Recon series #3: HTTP fingerprinting – sleuthing for a web application’s hidden vulnerabilities

Read More ->
YesWeHack Bug Bounty recon series, guide to subdomain enumeration, illustrated with endpoint nodes

Recon Series #2: Subdomain enumeration – expand attack surfaces with active, passive techniques

Read More ->
server-side template injection

Limitations are just an illusion – advanced server-side template exploitation with RCE everywhere

1/5
12345
Next

Footer

Logo YesWeHack
Logo YesWeHack

Products

  • Bug Bounty
  • Vulnerability Disclosure Policy
  • Pentest Management
  • Attack Surface Management
  • Live Hacking Events

Researchers

  • Start Hunting
  • Public Programs
  • Tools
  • Ranking
  • Dojo

Resources

  • Blog
  • Case Studies
  • Videos
  • Help Center
  • API
  • Github
  • Newsletter

Company

  • About YesWeHack
  • Trust & Security
  • Career
  • Press
  • Events
  • Contact

Follow us

Linkedin White
Twitter Logo
Youtube White
GitHub, YesWeHack

©2025 YESWEHACK

  • Legal Notices
  • Privacy Policy
  • Cookies Policy
  • Change Cookie Preferences