Bug Bounty Recon Workflow in 2026: From Scope to First Finding

The difference between hunters who find critical bugs and hunters who find duplicates is usually recon. Not skill, not luck โ€” recon. The hunter who maps the attack surface more thoroughly finds the assets that everyone else missed.

This is the recon workflow I use. It's not the only way, but it's systematic, repeatable, and it works.

Step 1: Read the Scope (Seriously)

Before running any tools, read the program's scope document completely. Look for:

The scope tells you where to focus. A wildcard scope (*.example.com) means subdomain enumeration is critical. A single-domain scope means you should go deep on that one application.

Step 2: Subdomain Enumeration

For wildcard scopes, subdomain enumeration is the highest-value recon step. Forgotten subdomains โ€” staging servers, old APIs, internal tools accidentally exposed โ€” are where critical bugs live.

Passive Enumeration (No Target Contact)

Start passive. These sources don't touch the target at all:

Active Enumeration (Touches Target DNS)

After passive, run active enumeration:

Combine results: merge all subdomain lists, deduplicate, and sort. A typical target yields 50-500 unique subdomains.

Step 3: Alive Check and Port Scan

Not all discovered subdomains are alive. Filter to only live hosts:

Step 4: Technology Fingerprinting

For each live host, identify the technology stack. This determines what vulnerabilities to test for.

Tools: Wappalyzer (browser extension), Nuclei (tech detection templates), whatweb. SecurityClaw's nextjs-recon and tech-stack-cve-scanner skills automate this for specific stacks โ€” see our new skills coverage.

Why this matters: If you find a Next.js app, test for _next/data exposure and environment variable leaks. If you find WordPress, test for plugin vulnerabilities. If you find an API gateway, test CORS configuration. The tech stack determines the attack surface.

Step 5: Endpoint Discovery

Now find every endpoint on each live host:

Crawling

Directory Brute-Force

Wayback Machine

Step 6: JavaScript Analysis

Modern web applications ship their logic in JavaScript bundles. These bundles contain:

How to analyze:

  1. Download all .js files from the application
  2. Search for patterns: /api/, Authorization, Bearer, apiKey, secret, internal
  3. Use tools like LinkFinder to extract URLs from JavaScript
  4. Beautify minified code with js-beautify for manual review

SecurityClaw's js_analyzer and js-bundle-recon skills automate this โ€” they extract endpoints, secrets, and internal references from JavaScript bundles.

Step 7: Prioritize Targets

You now have a list of live hosts, their tech stacks, and their endpoints. Don't test everything equally. Prioritize:

High Priority (Test First)

  1. Admin panels and login pages โ€” authentication bypass, default credentials, brute-force
  2. API endpoints with authentication โ€” IDOR, broken access control, mass assignment
  3. File upload functionality โ€” unrestricted upload, path traversal, command injection via filename
  4. Search and filter parameters โ€” SQL injection, XSS (these accept user input and often lack sanitization)
  5. Forgotten/staging subdomains โ€” often have weaker security controls than production

Medium Priority

  1. User profile and settings pages โ€” stored XSS, IDOR on profile data
  2. Payment and checkout flows โ€” business logic flaws, price manipulation
  3. OAuth/SSO integration points โ€” redirect URI manipulation, token leakage

Lower Priority

  1. Static content pages โ€” limited attack surface
  2. Well-known third-party integrations โ€” Stripe checkout, Google Maps embed (bugs here are usually the third party's responsibility)

Automating the Workflow

The recon steps above can be chained into a single automated pipeline. Here's the flow:

1. subfinder + amass + crt.sh โ†’ merged subdomain list
2. httpx โ†’ alive hosts with status codes
3. nuclei (tech-detect templates) โ†’ tech stack per host
4. ffuf โ†’ endpoint discovery per host
5. waybackurls โ†’ historical endpoints
6. LinkFinder โ†’ JS-extracted endpoints
7. Merge all endpoints โ†’ deduplicated target list

Tools like reconftw and axiom automate this entire chain. For CI/CD integration, see our guide on automating ZAP in GitHub Actions โ€” the same pattern works for recon tools.

Common Recon Mistakes

  1. Skipping passive recon โ€” jumping straight to active scanning misses CT log subdomains, GitHub leaks, and Wayback Machine endpoints.
  2. Using default wordlists only โ€” generic wordlists miss application-specific paths. Build custom wordlists from the target's JavaScript, documentation, and error messages.
  3. Not checking non-standard ports โ€” many interesting services run on 8080, 8443, 3000, or custom ports. A port 80/443-only scan misses them.
  4. Ignoring JavaScript bundles โ€” the richest source of hidden endpoints and secrets in modern web apps.
  5. Testing before understanding scope โ€” testing out-of-scope assets gets you banned from the program. Read the scope first.

Bottom Line

Recon is the foundation. A thorough recon workflow โ€” subdomain enumeration, alive checking, tech fingerprinting, endpoint discovery, JavaScript analysis โ€” gives you a complete map of the attack surface. From there, use the security testing checklist to systematically test what you've found.

The hunters who find the best bugs aren't necessarily the most skilled testers. They're the ones who found the assets that nobody else was looking at.

Advertisement