How to get started finding your own exploits?
I’ve had a decent amount of experience doing CTFs and the like, and things like big bounties and pwn2own sound fun, but it seems kind of out of reach. It doesn’t seem like the enumeration techniques I know would apply very well, and even finding someth…