# Methodology And Enumeration

:warning: Content of this page has been moved to [InternalSecurityResources/methodology/bug-hunting-methodology](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/methodology/bug-hunting-methodology/)

## Summary

* [Passive Recon](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/methodology/bug-hunting-methodology/#passive-recon)
  * Shodan
  * Wayback Machine
  * The Harvester
  * Github OSINT
* [Active Recon](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/methodology/bug-hunting-methodology/#active-recon)
  * [Network discovery](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/methodology/bug-hunting-methodology/#network-discovery)
  * [Web discovery](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/methodology/bug-hunting-methodology/#web-discovery)
* [Web Vulnerabilities](https://mahbubzulkarnain.github.io/catatan-seekor-the-series/methodology/bug-hunting-methodology/#looking-for-web-vulnerabilities)
