How to get started with Bug Bounty?
How to get started in Bug Bounty, Where to start bug bounty, What is the best time for starting bug bounty, What is the LAB setup I need to do bug bounty is a common question nowadays. I will help you out with these questions. The First thing you have to focus less on money and more on learning.
Disclaimer:
I have to tell you one thing, that doesn't focus on completing the blog or content that I have wrote. My advice is to understand each line and methodology that I have wrote. so make sure that you have understood every tool, theory, methodology, and some other things that I have used in this blog. Also, use desktop / Computer for use this blog
Prerequisites:
I will tell you some important prerequisites for getting started with a bug bounty.
- Good Laptop or Desktop
- Balanced Internet
- Basic computer knowledge like software installing, Notepad, and Web searching
- E-mail ID
- Mainly Interest
Make sure that these all prerequisites are with you or else just know about things and get started when you have these all prerequisites.
Lessons you will learn from this blog:
- Abbreviations and terminologies used in Bug hunting
- Basics of web language like HTML, CSS, and Javascript
- Proxy
- Protocols
- Port numbers
- HTTP status code
- Headers
- Basics of network security
- Different encoding mechanisms
- Basics of cryptography
- Same-Origin Policy (SOP)
- Cross-Origin Resource Sharing
- Session management
- Different ways of identifying a user
- Cookies
- Authentication headers
- Basic knowledge about how session IDs issued
- Google dorks & How to find bugs with Google dorks?
- Burp suite & other web testing tools
- Various types of bugs, the priority of the bugs, and average bounty based on the priority of bugs
- Report writing and POC Video editing
- Analyze the best report writing and find the bounty methodology
- Github and How hackers are using GitHub
- And more
Bugs we will cover:
- Email spoofing
- Clickjacking
- Cross-site scripting(XSS)
- Open redirection
- Insecure Direct Object References (IDOR)
- Cross-Site Request Forgery (CSRF)
- Server-Side Request Forgery (SSRF)
- SQL Injection
- Deserialization issues
- Remote Code Execution (RCE)
- Race Conditions
- Broken Access Control
- And more
Others:
- Find Bugs using dorks and report it
- HackerOne and bug crowd bug finding methodology
- Automotive bug identification methodology
- And more
So let's jump into our learning process. Stay with me guys I will take you out to the bug hunting world.
0 Comments: