Getting Started With Bug Bounty Hunting in 2022 | Shubham
If you were just wondering by seeing the bug bounty stories and posts of facebook friends and always wanted to get started with this bug bounty but never knew how to do it, then today I’ll give you the resources that I’ve accumulated so far. You may be wondering how I’ll get started with bug bounty because I don’t know anything about hacking.
DON’T WORRY TODAY I’LL SHOW YOU THE WAY TO GET STARTED WITH BUG BOUNTY HUNTING
Beginner’s Resources To Bug Hunting
In first step, I’ll give you all the resources that I’ve accumulated so far with links. My advice for you is to learn from those resources in a daily basis consistently for few months. You will find all the important learnings related to bug bounty hunting and other cyber security research learnings within it prepared by great infosec writers and hackers.
My Bug Hunting & Hacking Resources
1.1.1 Youtube Channels To Learn
(Links and points may be repeated and in unordered list because these are directly copied and pasted from my notes. Sorry for that.)
- Hackerone (https://www.youtube.com/c/HackerOneTV/playlists)
- DEFCON Conference videos on YouTube
- Hak5 on YouTube
- How To Shot Web — Jason Haddix, 2015
- Bug Bounty Hunting Methodology v2 — Jason Haddix, 2017
- Hunting for Top Bounties — Nicolas Grégoire, 2014
- The Secret life of a Bug Bounty Hunter — Frans Rosén, 2016
- Finding Bugs with Burp Plugins & Bug Bounty 101 — Bugcrowd, 2014
- How to hack all the bug bounty things automagically reap the rewards profit — Mike Baker, 2016
- SecurityIdiots
- BlackHat
- Injector PCA
- DevilKiller
- SulemanMalik
- SulemanMalik
- Penetration Testing in linux
- https://www.youtube.com/watch?v=mQjTgDuLsp4&list=PLl-GuflHOikWnr0kOThK0xOyFXhBZbdLv (Bug hunters presentations)
- https://www.youtube.com/watch?v=2R4YXEAG6AI&list=PLZaG0MNecryP55u43LWqHy5MADcvLjnL- (Web hacking pro tips)
- https://www.youtube.com/watch?v=TYgZXwfNrCo&list=PL03WlR9wok56QxSIUuxkhuVKaorToULfB (bug hunters presentations 2)
- https://www.youtube.com/results?search_query=bug+bounty+playlist
- https://www.youtube.com/watch?v=1Sj4RtMllu8
- https://www.youtube.com/results?search_query=peter+yaworski
- https://www.youtube.com/watch?v=2R4YXEAG6AI&list=PLZaG0MNecryP55u43LWqHy5MADcvLjnL-
- https://www.youtube.com/watch?v=BEaMhs9LmoY
- https://www.youtube.com/watch?v=cSnLdAzUUuI
- Bugcrowd
- Channel 51. Channel with explanation of concepts related to the Certified Ethical Hacker (CEH) v10 course.
- Coding Tech
- Computerphile
- Corey Schafer
- DEFCONConference
- Gynvael
- HackerSploit
- Jackk
- https://www.youtube.com/channel/UCUfO02gdMDXgOJWdv_jiLMg
- https://www.youtube.com/channel/UC8nq3PX9coMiqgKH6fw-VCQ
- https://www.youtube.com/watch?v=jmgsgjPn1vs&list=PLhixgUqwRTjx2BmNF5-GddyqZcizwLLGP
- https://www.youtube.com/channel/UCq9IyPMXiwD8yBFHkxmN8zg
- https://www.youtube.com/c/TheCyberMentor/videos
- https://www.youtube.com/channel/UC41QUYMwKgxGLkZkBh39xVg/videos
- Jhaddix
- John Hammond
- LiveOverflow
- MIT
- PwnFunction
- Yaworsk
- STÖK.
- The Cyber Mentor. Lessons about hacking, penetration testing and other stuff.
- ZephrFish
- Zseano. This channel contains live mentoring sessions about hacking.
- https://www.youtube.com/c/GynvaelEN/videos
- https://www.youtube.com/channel/UCPiN9NPjIer8Do9gUFxKv7A
- https://www.youtube.com/results?search_query=Frans+Rosen+
- InsiderPHD
- Hakluke
- https://www.youtube.com/watch?v=-FAjxUOKbdI&list=PLklUUp4jKus9Hck7zq3QCvQoxWs7b7091
- https://www.youtube.com/watch?v=-FAjxUOKbdI&list=PLklUUp4jKus9Hck7zq3QCvQoxWs7b7091
- https://www.youtube.com/watch?v=C4ZHAdI8o1w
- https://www.youtube.com/watch?v=mQjTgDuLsp4
- https://www.youtube.com/watch?v=KDo68Laayh8
- https://www.youtube.com/watch?v=Q2WK5LpDbxw
- https://www.youtube.com/watch?v=XoYF-euS-zs
- https://www.youtube.com/c/SpinTheHack/videos
1.1.2 Websites To Learn
(Links and points may be repeated and in unordered list because these are directly copied and pasted from my notes. Sorry for that.)
https://securib.ee/beelog/the-best-bug-bounty-recon-methodology/
- Good sources for new stuff
- Twitter: #bugbounty #infosec (search it on twitter)
- Reddit: /r/netsec/
- Hacker News: news.ycombinator.com
- **https://osintframework.com/ (Best Tool For Recon and Hacking Stuffs)**
- https://gowsundar.gitbook.io/book-of-bugbounty-tips/
- https://www.twitch.tv/nahamsec
- https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/
- https://pentester.land/conference-notes/2018/07/25/bug-bounty-talks-2017-automation-for-bug-hunters.html
- http://www.catb.org/esr/faqs/hacker-howto.html
- https://bugbountyworld.com/
- https://www.bugcrowd.com/blog/
- https://bugbountyforum.com/
- @mandatory — thehackerblog.com
- @ArneSwinnen — www.arneswinnen.net
- @bbuerhaus — buer.haus
- @nahamsec — nahamsec.com
- @bugbountyforum — bugbountyforum.com/blogs/
- https://gowsundar.gitbook.io/book-of-bugbounty-tips/
- **https://osintframework.com/ (Best Tool For Recon and Hacking Stuffs)**
- https://www.bugcrowd.com/blog/
- https://whoami.securitybreached.org/tag/bug-bounty-hunting/
- Azeria Labs
- bugbountynote
- EdOverflow
- gynvael
- hacker101
- hackertube
- lcamtuf
- Pentester Land
- Pentestmonkey
- portswigger
- SecJuice
- STÖK
- skeletonscribe
- The Cyber Mentor
- zseano
- https://portswigger.net/web-security
- Getting Started 001
- PentesterLand
- 0xPatrik
- The Book Of Secret Knowledge
- Nahamsec
- https://blog.xpnsec.com/
- https://legalhackers.com/
- https://github.com/infoslack/awesome-web-hacking
- https://cornerpirate.com/
- https://www.cybersecuritychallenge.org.uk/
- https://tulpasecurity.files.wordpress.com/2016/09/tulpa-pwk-prep-guide1.pdf
- https://www.bugbountyhunter.com/
- https://www.reddit.com/r/hacking/
- https://www.reddit.com/r/hacking/
- https://www.malwaretech.com/
- https://portswigger.net/blog
- https://brutelogic.com.br/blog/file-upload-xss/
- https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit
- https://www.hackerone.com/blog/100-hacking-tools-and-resources
- https://bugbountyguide.com/index.html#
1.1.3 Hackers & Bug Bounty Hunter’s Twitter Account To Learn
- @0xacb
- @albinowax
- @arneswinnen
- @Beaujeant
- @brutelogic
- @daeken
- @DanielMiessler
- @EdOverflow
- @emgeekboy
- @evilsocket
- @fransrosen
- @filedescriptor
- @gynvael
- @jhaddix
- @LiveOverflow
- @NahamSec
- @ngalongc
- @pentest_swissky
- @phwd
- @pentest_swissky
- @PortSwigger
- @seanmeals
- @stokfredrik
- @thecybermentor
- @TomNomNom
- @yaworsk
- @ZephrFish
- @zseano
1.1.4 Bug Bounty Vocabularies
This is one of the most important aspect of learning. You need to first know the vocabulary. I’ve listed the vocabularies of hacking and bug bounty hunting. You can search each word on youtube and google and learn about it. There are enough vocabularies here to learn. Just search the given word from youtube and google.
(Links and points may be repeated and in unordered list because these are directly copied and pasted from my notes. Sorry for that.)
- OWASP TOP 10 Vulnerabilities
- Injection
- Broken authentication
- Sensitive data exposure
- XML external entities (XXE)
- Broken access control
- Security misconfigurations
- Cross-site scripting (XSS)
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
- Cross-Site Request Forgery
- Browser Vulnerabilities Name
- Browser Hack Bug bounty
- Websocket vulnerability
- Cross-origin resource sharing (CORS)
- Web Storage vulnerability
- Geolocation
- XML Vulnerability
- HTMl Vulnerability
- CSS Vulnerability
- Web Storage Vulnerability
- Webkit Vulnerability,
- Trident Vulnerability
- Document Object Model (DOM) Vulnerability
- VB Script Vulnerability
- JS files vulnerability
- WebRTC Api vulnerability
- Same Origin Policy (SOP)
- Bypassing Same Origin Policy (SOP)
- Exploitation of SOP Bypass
- SOP with the DOM bug bounty
- SOP with CORS bug bounty
- SOP with plugins vulnerability or bug bounty
- SOP with UI redressing
- SOP with Browser History
- SOP Bypasses
- Bypassing SOP in Java
- Bypassing SOP in Internet Explorer, Safari, Fireforx, Opera, Adobe reader, Silverlight, Adobe Flash, Cloud Storage, CORS
- Exploiting UI Redressing Attacks by
- Using Clickjacking
- Using Filejacking
- Using Drag and Drop
- Exploiting Browser History by
- Using CSS Colors
- Using Cache Timing
- Using Browser APIs
- Attacking Extension
- Fingerprinting using
- Fingerprinting using HTTP Headers
- Fingerprinting using DOM
- Lastpass fingerprinting
- Fingerprinting using the manifest
- Bypassing Web Application CSP
- Fireforx RCE
- OS Command Execution
- Attacking DOM Event Handlers
- Attacking Drag and Drop
- Broken Access Control
- Insecure Direct Request Forgery (IDOR)
- Local File Disclosure (LFD)
- SQL Injection
- Business Logic Flaws
- XXE
- Template Injections
- Cross Site Scripting
- Server Side Request Forgery (SSRF)
- XML External Entity (XXE)
- OS Command Injection
- Open Redirect
- Subdomain Takeover
- Remote Command Execution (RCE)
- Testing File Uploaders
- Clickjacking
- XXE Vulnerability
- File Upload Vulnerabilities
- Local File Inclusion vulnerabilities
- Remote File Inclusion Vulnerabilities
- Broken Access Control
- Subdomain Takeover
- Business Logic Vulnerability
- Click Jacking
- Broken Link Hijacking
- Command Injection
- Information Disclosure Bug
- Denial of Service (DOS)
- Violation of secure design principle
- HTTP Parameter Pollution
- Bug Bounty Methodology
- Reconnaissance
- Bash
- Browser Hacks
- XML Bug Bounty
- Information Gathering Tool
- API Bug Bounty; API Endpoints
- Js files; Endpoints
- Testing Environment
- Waybackmachine
- Eyewitness tool
- Docker For Bug Bounty
- Google Dorking
- Brute Forcing
- Fuzzing
- Bug Bounty Manual and Automation
- Recon
- Subdomain Enumeration
- Recon Workflow; Bug Bounty Workflow
- Bug Bounty Platforms: Major Platforms, Regional Platforms, Private Platforms, Self Hosted Platforms.
- Vulnerability Disclosure Program
- CTF
- Burp Suite
- Vulnerability Scanner
1.1.5 Bug Bounty Platforms
(Links and points may be repeated and in unordered list because these are directly copied and pasted from my notes. Sorry for that.)
- Bugcrowdhttps://www.bugcrowd.com/
- Hackerone https://www.hackerone.com/
- Synackhttps://www.synack.com/
- Japan Bug bounty Programhttps://bugbounty.jp/
- Cobalthttps://cobalt.io/
- Zerocopterhttps://zerocopter.com/
- Hackenproofhttps://hackenproof.com/
- BountyFactoryhttps://bountyfactory.io
- Bug Bounty Programs List https://www.bugcrowd.com/bug-bounty-list/
- AntiHackhttps://www.antihack.me/
- Open For Signup
- HackerOne
- Bugcrowd
- BountyFactory
- Intigriti
- Bugbountyjp
- Safehats
- BugbountyHQ
- Hackerhive
- Hackenproof
- Hacktrophy
- CESPPA
- BountyFactory
- OpenBugBounty (OBB) [Limited to XSSi and other non-intrusive type vulnerabilities]
- Invite based Platforms
- Synack
- Cobalt
- Zerocopter
- Yogosha
- Bugbountyzone
- Antihack.me
- Vulnscope
- Detectify
- Other Platforms (Open)
- Hackenproof(crypto)
- Immunefi (crypto)
- BugBountyjp (Issues — Payment Delays)
- BugsBounty (Upcoming Platform)
- CESPPA
- Hackrfi
- Safehats (Indian origin, although registration is open, goes through validation)
- Upcoming Platforms
- PlugBounty (Vulnerabilities in Plugins)
- BugsBounty (Indian origin)
1.1.6 Bug Bounty & Ethical Hacking Books
(Links and points may be repeated and in unordered list because these are directly copied and pasted from my notes. Sorry for that.)
Books
- The Web Application Hacker’s Handbook
- OWASP Testing Guide Highly suggested by Bugcrowd’s Jason Haddix
- Penetration Testing
- Modern Web Penetration Testing
- Hackers Underground Handbook Secure
- Web hacking 101
- The Hacker Playbook 2: Practical Guide to Penetration Testing
- The Tangled Web: A Guide to Securing Web Applications
- Jhaddix Bug Hunting Methodology
- The Hacker Playbook-3
- Ethical Hacking and Penetration Guide
- Web Penetration Testing with Kali Linux
- Gill, A. (2017). Breaking into Information Security: Learning the Ropes 101. Leanpub.
- Stuttard, D., & Pinto, M. (2011). The Web Application Hacker’s Handbook. Indianapolis, USA: John Wiley & Sons, Inc.
- Yaworski, P. (2017). Web Hacking 101. Leanpub.
- https://gowsundar.gitbook.io/book-of-bugbounty-tips/
- The web application hacker’s handbook
- owasp testing guide
- web hacking 101
- breaking into infromation security
- mastering mordern web peneteration testing
- https://github.com/jhaddix/tbhm
- https://www.gitbook.com/?utm_source=legacy&utm_medium=redirect&utm_campaign=close_legacy
Web and browser
- Web Hacking 101 by Peter Yaworski.
- Breaking into Information Security: Learning the Ropes 101 by Andy Gill.
- The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto.
- Tangled Web by Michal Zalewski.
- OWASP Testing Guide v4 by OWASP Breakers community.
Mobile
- The Mobile Application Hacker’s Handbook by Dominic Chell et al.
- iOS Application Security: The Definitive Guide for Hackers and Developers by David Thiel.
- The Mobile Application Hacker’s Handbook
- iOS Application Security
- Owasp Mobile AppSec
Cryptography
- Crypto 101 by Laurens Van Houtven.
Penetration Testing
- The Art of Exploitation by Jon Erickson, 2008
- Metasploit: The Penetration Tester’s Guide by David Kennedy et al., 2011
- Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
- Rtfm: Red Team Field Manual by Ben Clark, 2014
- The Hacker Playbook by Peter Kim, 2014
- The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013
- Professional Penetration Testing by Thomas Wilhelm, 2013
- Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012
- Violent Python by TJ O’Connor, 2012
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Penetration Testing: Procedures & Methodologies by EC-Council, 2010
- Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010
- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014
- Bug Hunter’s Diary by Tobias Klein, 2011
- Advanced Penetration Testing by Wil Allsopp, 2017
- The tangled Web: a guide to securing modern Web applications
There are many aspects yet to learn first learn from above resources. I’ll keep writing articles in detail in next parts. Till then study these.
Thank You,
Shubham Dhungana