Summary
In this chapter, we discussed the different methodologies for pentesting. We explored the general phases of a pentest that will help us search for vulnerabilities in the bug bounty world. I also provided some tips based on my experience in this area. At this point, you will be able to choose the methodology that best suits your needs, and you will also know how to conduct the different phases of a pentest.
In the next chapter, you will learn about the tools and resources needed to be able to work in the bug hunting world.