Live Bug Bounty Hacking | How I Approach a Target To Find Vulnerabilities