Practical Bug Bounty Notes for the TCM Security course Practical Bug Bounty: Introduction Reconnaissance Authentication and Authorization Attacks Injection Attacks Automated Tools Other Common Vulnerabilities Reporting