In previous post, we discussed about how to setup a Recon Machine on VPS and how to use Screen to maintain your recon process even after you logout from VPS. This article would walk you through some other linux tricks Bug Bounty Hunter normally used in their hacking.
Schedule Your Task
In Linux, you can schedule your task automatically. For example, you can schedule…