Penetration Testing Vs Bug Bounty- What To Do And When