CTF or Bug Bounty info gathering workflows [closed]
What is the best way to get more information from the information-gathering stages/ reconnaissance when trying CTFs? Is there any workflow for a new cybersecurity student who knows some programming?
for example consider against virtual mac…