
Jasmin Landry
@jr0ch17
Bug Bounty Hunter
ID: 745299291338604544
21-06-2016 16:56:12
749 Tweet
8,8K Followers
483 Following


The first stage of bug hunting is recon. The first stage of recon is... subdomains? Not always. Jasmin Landry prefers a small scope and focuses on single applications instead. Here's his unique 11 step approach to recon๐

Jasmin Landry For more details on Jasmin Landry's unique approach to bug hunting, read his LevelUp write-up: "How to find better bugs" ๐ bugcrowd.com/resources/leveโฆ


Super excited and proud to announce Iโll be running the official Bug Bounty Village at @DEFCON alongside Harley Kimball for the first time! Follow @BugBountyDefcon for updates and join us in shaping the future of Bug bounty. Please help us with a RT #BugBountyVillage #DEFCON


19 questions Jasmin Landry asks himself when looking through requests in order to identify and document potential vulnerabilities: 1. What methods of authentication are supported?


This made me remember an ATO bug I found a few years ago. The app used perl's crypt function as the token generator for password resets, here's the docs for it perldoc.perl.org/functions/crypt. You'll quickly notice the problem with it ๐ Or I guess the real problem was that the app was

"What keeps me on programs is the interaction with the people. Good communication, access to unique scopes, setting campaigns with increased payment for findings, getting a real person on reports rather than a bot." Hacker Jasmin Landry chatted with #SecurityAt attendees on some





116 total reports, including 19 criticals! Letโs hope those numbers improve in 2025 as Iโll be doing bug bounty full time! hackerone.com/stories-of-202โฆ Justin Gardner looks like Iโll be roaming around in the savanna with you ๐ฆ



New video out with Jasmin Landry! We break down an SSRF bypass against a validation pattern youโll definitely see again โ and show how to land critical without cloud metadata. Enjoy๐ฅ youtu.be/uoKMhb6juSo




In this episode, Jasmin Landry breaks down how he consistently lands highs and crits - from SSRFs to less common bugs like XXEs and SQLis. Enjoy๐ฅ youtu.be/0-o3_NumvbI