Skip to main content

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

More articles


  1. Pentest Tools Android
  2. Pentest Tools For Windows
  3. Android Hack Tools Github
  4. Pentest Tools Website
  5. Hackers Toolbox
  6. Kik Hack Tools
  7. Beginner Hacker Tools
  8. Hack Tools Download
  9. Pentest Tools Url Fuzzer
  10. Hacking Tools Pc
  11. Hacking Tools And Software
  12. Nsa Hack Tools
  13. Tools 4 Hack
  14. Growth Hacker Tools
  15. Pentest Tools Review
  16. Hacking Tools Online
  17. Hack Tools Pc
  18. Hack Tools Mac
  19. Hackrf Tools
  20. Hacking Tools For Windows 7
  21. New Hacker Tools
  22. Pentest Tools Kali Linux
  23. Hacker Tools Online
  24. Best Pentesting Tools 2018
  25. Hacker Tools Apk
  26. Growth Hacker Tools
  27. What Is Hacking Tools
  28. Hacker Tools Windows
  29. Hacker Tools Apk
  30. Pentest Tools Open Source
  31. Best Pentesting Tools 2018
  32. Black Hat Hacker Tools
  33. What Is Hacking Tools
  34. Pentest Tools Subdomain
  35. Hacker Tools Free Download
  36. Pentest Tools Android
  37. Hacking Tools Usb
  38. Pentest Tools List
  39. How To Make Hacking Tools
  40. Nsa Hacker Tools
  41. Hacker Tools For Ios
  42. Hacker Tool Kit
  43. Hacking Tools
  44. Bluetooth Hacking Tools Kali
  45. Computer Hacker
  46. Pentest Recon Tools
  47. Pentest Tools Open Source
  48. Pentest Tools Alternative
  49. Hack Tool Apk
  50. Hack Tools For Pc
  51. Hack And Tools
  52. Hacker Tools Linux
  53. Hack Tool Apk
  54. Github Hacking Tools
  55. Hacker Tools For Pc
  56. Hacker Tools Online
  57. Pentest Tools List
  58. Pentest Tools For Ubuntu
  59. Hacking Tools Windows 10
  60. Pentest Tools Website
  61. Hak5 Tools
  62. Hacking Tools Pc
  63. Hack Tools Mac
  64. Pentest Tools
  65. Hacking Tools Download
  66. Hack Tool Apk No Root
  67. Nsa Hacker Tools
  68. Hacker Tools
  69. Hacking Tools Github
  70. Hacker Tools 2019
  71. Nsa Hack Tools
  72. Hacker Tools For Windows
  73. Hack Tools Online
  74. Hack Tools Github
  75. Hacking Tools And Software
  76. Hack Tools For Ubuntu
  77. Hacking Tools Software
  78. Bluetooth Hacking Tools Kali
  79. Hacking Tools 2019
  80. Pentest Tools Github
  81. Hack Tools For Mac
  82. Hacking App

Comments

Popular posts from this blog

דף הבית | הטכניון - מכון טכנולוגי לישראל

https://technion.ac.il http://library.technion.ac.il/he https://www.technion.ac.il/%D7%A8%D7%A9%D7%99%D7%9E%D7%AA-%D7%94%D7%A4%D7%A7%D7%95%D7%9C%D7%98%D7%95%D7%AA-2/ http://www.admin.technion.ac.il/dpcalendar/ https://www.technion.ac.il/%D7%94%D7%A0%D7%94%D7%9C%D7%94-%D7%91%D7%9B%D7%99%D7%A8%D7%94/ https://www.technion.ac.il/%D7%A1%D7%9E%D7%99%D7%A0%D7%A8%D7%99%D7%9D/ https://dean.web.technion.ac.il/%D7%A7%D7%9E%D7%A4%D7%95%D7%A1-%D7%AA%D7%95%D7%A1%D7%A1/ http://www.dmag.co.il/pub/technion/tmag.html http://moodle.technion.ac.il/ https://tender-logistics.web3.technion.ac.il http://cis.technion.ac.il/ http://video.technion.ac.il/ https://portal.technion.ac.il/irj/portal https://www.technion.ac.il/ https://www.technion.ac.il/en/home-2/ http://arabic.net.technion.ac.il https://www.technion.ac.il/%d7%97%d7%96%d7%95%d7%9f-%d7%94%d7%98%d7%9b%d7%a0%d7%99%d7%95%d7%9f/ https://www.technion.ac.il/%d7%94%d7%99%d7%a1%d7%98%d7%95%d7%a8%d7%99%d7%99%d7%aa-%d7%94%d7%98%d7%9b%d7%a0%d7%99%d7%95%d7%9f/ ht...

Gu Energy Gel for Sale

Get Gu Energy Gel Here - https://bit.ly/3f97Wvz _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

To Kilinochchi or Mankulam?- The Nation- 2008/09/07

This week saw one of the most ferocious battles since the security forces started their campaign to regain the Wanni around mid last year. The LTTE’s much anticipated counter strike was launched along their newly built trench line from the western coastal town Nachchikudah to the deep interior region Akkarayankulam, a fair distance of 18-20 km in length. This trench line, which is mainly an earth bund of around 7-15 feet at certain places, was built in recent times with heavy machinery cutting across shrub jungles. In a series of waves, the LTTE attacked personnel of the Army’s 58 and 57 Divisions last Wednesday in a battle that lasted 36 hours. The LTTE claimed to have killed up to 100 military personnel, while the military initially claimed that only nine soldiers were killed. However, with the LTTE claiming that they had recovered the bodies of 29 soldiers and posted pictures of the dead on pro-LTTE websites, the Army said that ...