
Jasmin Landry
@jr0ch17
Bug Bounty Hunter
ID: 745299291338604544
21-06-2016 16:56:12
749 Tweet
8,8K Followers
483 Following


The first stage of bug hunting is recon. The first stage of recon is... subdomains? Not always. Jasmin Landry prefers a small scope and focuses on single applications instead. Here's his unique 11 step approach to recon👇

Jasmin Landry For more details on Jasmin Landry's unique approach to bug hunting, read his LevelUp write-up: "How to find better bugs" 👇 bugcrowd.com/resources/leve…


Super excited and proud to announce I’ll be running the official Bug Bounty Village at @DEFCON alongside Harley Kimball for the first time! Follow @BugBountyDefcon for updates and join us in shaping the future of Bug bounty. Please help us with a RT #BugBountyVillage #DEFCON


19 questions Jasmin Landry asks himself when looking through requests in order to identify and document potential vulnerabilities: 1. What methods of authentication are supported?



"What keeps me on programs is the interaction with the people. Good communication, access to unique scopes, setting campaigns with increased payment for findings, getting a real person on reports rather than a bot." Hacker Jasmin Landry chatted with #SecurityAt attendees on some





116 total reports, including 19 criticals! Let’s hope those numbers improve in 2025 as I’ll be doing bug bounty full time! hackerone.com/stories-of-202… Justin Gardner looks like I’ll be roaming around in the savanna with you 🦁



New video out with Jasmin Landry! We break down an SSRF bypass against a validation pattern you’ll definitely see again — and show how to land critical without cloud metadata. Enjoy🔥 youtu.be/uoKMhb6juSo




In this episode, Jasmin Landry breaks down how he consistently lands highs and crits - from SSRFs to less common bugs like XXEs and SQLis. Enjoy🔥 youtu.be/0-o3_NumvbI