You can use this page to email Chethine Liyanarachchi about Bug Bounty Walkthrough.
About the Book
This Book was completed for the Web Security module in the second year, second semester of the second year. I was given the task of conducting a security evaluation of the website http://twitter.com. The primary goal of this assignment is to identify potential security vulnerabilities in the target domain that could result in a breach of security, and to categorize those vulnerabilities according to the level of risk they pose.