How I Found My First Bug $$$

How My First Bug Turned into a Bounty

Author: Amine SAJID


During a security assessment of a private program, I discovered an information disclosure that allows attackers to access sensitive information of 427 user (Payment preferences, personal info…)

Bug Type: Information Disclosure

Severity: Medium


I got invited to a new private program, and the scope was: target.com, so subdomains were not in scope. I started hunting on the main domain and noticed that it interacted with a subdomain—let’s call it media.target.com. A quick search on the Wayback Machine (Archive) revealed a lot of PDF files named like 22434.pdf, 72452.pdf, and so on. These files contained payment receipts, which included sensitive information such as national identity numbers, names, addresses, phone numbers, and more.

First Bug

I reported the bug, and it was accepted even though the subdomain wasn’t in scope. I received my bounty within a day.


Unauthorized access to user’s private information.


Move the PDF files to a secure private folder


This experience taught me that hunting out-of-scope bugs can still be effective, especially when they impact the main domain’s users. Additionally, out-of-scope targets are often overlooked by hackers, making it easier to uncover critical vulnerabilities. I reported the issue and earned a bounty, proving the value of exploring beyond the defined scope.


The first bug has a special feeling, especially when you find it in a bug bounty program and get your effort paid off.


Follow Secureweb

Leave a Reply

Your email address will not be published. Required fields are marked *