![Bug Bounty Hunting Essentials](https://wfqqreader-1252317822.image.myqcloud.com/cover/130/36699130/b_36699130.jpg)
上QQ阅读APP看书,第一时间看更新
Key learning from this report
- These were very simple SQL injections that were identified with less effort and attracted decent bounties
- Reporters focused on the exploitation parts and were rewarded for that, which tells us that, in critical vulnerabilities, exploitation is the key