At the end of successfully completing this challenges series, you will be able to learn the approach that allows you to:


Organizations have been failing to maintain basic CIS controls - inventory of assets and secure configurations.  This has been the case of the major success in bounty programs where identifying Internet-facing assets yields most rewards with relatively less effort due to improper access controls. These challenge series emulate most prevalent techniques that bounty hunters use to dig dive into discovering Internet-facing assets.  

How to start:
Click on your desired challenge from the left navigation panel.