Saturday, August 22, 2020

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

Related news
  1. Hacker Tools For Mac
  2. Growth Hacker Tools
  3. Pentest Box Tools Download
  4. Hacker Security Tools
  5. Hacker Tools
  6. Hackrf Tools
  7. Hacking Tools Windows 10
  8. Hacking Tools 2019
  9. Growth Hacker Tools
  10. World No 1 Hacker Software
  11. Hacking Tools Mac
  12. Hack Tools Mac
  13. Hack Tools For Pc
  14. Install Pentest Tools Ubuntu
  15. Hacking Apps
  16. Pentest Tools Website
  17. Hacking Tools
  18. Hacking Tools And Software
  19. Pentest Tools For Windows
  20. Pentest Tools Kali Linux
  21. Hack Rom Tools
  22. Pentest Box Tools Download
  23. Hacker Tools For Windows
  24. Hacker
  25. Hacking Tools For Mac
  26. Hacker Security Tools
  27. Hacking Apps
  28. Pentest Tools Subdomain
  29. Pentest Box Tools Download
  30. Hacking Tools Online
  31. Pentest Recon Tools
  32. Hacking Tools For Beginners
  33. Hackers Toolbox
  34. Hacker Tools For Pc
  35. Hack Tools Download
  36. Hacking Tools Usb
  37. Pentest Automation Tools
  38. Hack Tools 2019
  39. Github Hacking Tools
  40. What Are Hacking Tools
  41. Hacking Tools
  42. Hacker Tools For Pc
  43. Hack Tools Pc
  44. Pentest Tools Online
  45. Hacking Tools Name
  46. Pentest Tools Port Scanner
  47. Hacking Tools For Windows 7
  48. Pentest Tools Subdomain
  49. Pentest Automation Tools
  50. Hack Tools
  51. Hacking Tools For Kali Linux
  52. Hack Tools Online
  53. Hacking Tools 2020
  54. New Hacker Tools
  55. Pentest Tools Website Vulnerability
  56. Hacker Tools Mac
  57. Growth Hacker Tools
  58. Pentest Tools Download
  59. Hacker Tools Github
  60. Hacking Tools For Windows Free Download
  61. Hacking Tools For Games
  62. Ethical Hacker Tools
  63. Pentest Tools Android
  64. Android Hack Tools Github
  65. Pentest Tools For Ubuntu
  66. Best Pentesting Tools 2018
  67. Hacking Tools
  68. Hack Website Online Tool
  69. New Hacker Tools
  70. Hacker Tools Free Download
  71. Hack And Tools
  72. Ethical Hacker Tools
  73. Game Hacking
  74. Beginner Hacker Tools
  75. Hack App
  76. Hack Tools Github
  77. Pentest Tools Port Scanner
  78. Pentest Tools Bluekeep
  79. Pentest Reporting Tools
  80. Hacking Tools Software
  81. Hacking Tools And Software
  82. Hack And Tools
  83. Pentest Tools Android
  84. Pentest Tools Review
  85. Hacking Tools Software
  86. Pentest Tools For Android
  87. Pentest Tools Review
  88. Hack Tools Github
  89. Hacker Tools For Ios
  90. Pentest Tools Android
  91. Free Pentest Tools For Windows
  92. Hacking Tools 2020
  93. Hacker Tools Apk
  94. Hack Tools 2019
  95. Hacking Tools For Mac
  96. Hak5 Tools
  97. Termux Hacking Tools 2019
  98. Hacker Tools 2020
  99. Nsa Hack Tools Download
  100. Pentest Tools Open Source
  101. Pentest Tools Url Fuzzer
  102. How To Install Pentest Tools In Ubuntu
  103. Pentest Tools For Mac
  104. Nsa Hacker Tools
  105. Hack Tools For Games
  106. Hacking Tools For Windows
  107. Hack Tools For Windows
  108. Hacker Techniques Tools And Incident Handling
  109. Hacker Tools List
  110. Hacking Tools
  111. Pentest Tools Review
  112. Hacking Tools And Software
  113. Blackhat Hacker Tools
  114. Hacks And Tools
  115. Best Pentesting Tools 2018
  116. Hacking App
  117. Hacker
  118. Hacking Tools Windows
  119. Pentest Tools Find Subdomains
  120. Hacking Tools Name
  121. How To Make Hacking Tools
  122. Hacking Tools For Mac
  123. Hacker Tools Online
  124. Hack App
  125. Computer Hacker
  126. Pentest Tools Port Scanner
  127. Hak5 Tools
  128. Pentest Tools Github
  129. Tools 4 Hack
  130. Top Pentest Tools
  131. Pentest Tools Open Source
  132. Pentest Tools Nmap
  133. Hacking Tools Usb
  134. Best Hacking Tools 2019
  135. Best Pentesting Tools 2018
  136. Best Pentesting Tools 2018
  137. Pentest Tools Alternative
  138. Hacking Tools For Mac
  139. Hacking Tools 2019
  140. Github Hacking Tools
  141. Hack And Tools
  142. Hacker Tools Free
  143. Hak5 Tools
  144. Pentest Tools Alternative
  145. Pentest Tools Apk
  146. Bluetooth Hacking Tools Kali
  147. Bluetooth Hacking Tools Kali
  148. Hackrf Tools
  149. World No 1 Hacker Software
  150. Hacking Tools For Games
  151. Hacking Tools Hardware
  152. Hacks And Tools
  153. Hacker Tools Free
  154. Hack Tools 2019
  155. Hack Tools For Windows
  156. Hacker Tools Linux
  157. Pentest Tools Github
  158. Hacking Tools Name
  159. Hacker Tools For Ios
  160. Hacking Tools Windows
  161. Hacker Security Tools
  162. Pentest Tools Subdomain
  163. Hacker Tools Windows
  164. Hacking Tools For Beginners
  165. Pentest Tools Alternative
  166. Underground Hacker Sites
  167. Hacker Hardware Tools
  168. What Is Hacking Tools
  169. Hackrf Tools
  170. Hacking Tools Software
  171. Hacking Tools Online
  172. Pentest Tools Bluekeep
  173. Pentest Tools Kali Linux
  174. Hacking Tools For Beginners
  175. Hacks And Tools
  176. Hacking Tools And Software

No comments:

Post a Comment