Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Bug Bounty Hunting Essentials

You're reading from   Bug Bounty Hunting Essentials Quick-paced guide to help white-hat hackers get through bug bounty programs

Arrow left icon
Product type Paperback
Published in Nov 2018
Publisher
ISBN-13 9781788626897
Length 270 pages
Edition 1st Edition
Tools
Concepts
Arrow right icon
Authors (2):
Arrow left icon
Shahmeer Amir Shahmeer Amir
Author Profile Icon Shahmeer Amir
Shahmeer Amir
Carlos A. Lozano Carlos A. Lozano
Author Profile Icon Carlos A. Lozano
Carlos A. Lozano
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Basics of Bug Bounty Hunting 2. How to Write a Bug Bounty Report FREE CHAPTER 3. SQL Injection Vulnerabilities 4. Cross-Site Request Forgery 5. Application Logic Vulnerabilities 6. Cross-Site Scripting Attacks 7. SQL Injection 8. Open Redirect Vulnerabilities 9. Sub-Domain Takeovers 10. XML External Entity Vulnerability 11. Template Injection 12. Top Bug Bounty Hunting Tools 13. Top Learning Resources 14. Other Books You May Enjoy

Rules of bug bounty hunting

We will study the rules of bug bounty hunting in the following sections.

Targeting the right program

Targeting a bug is not a matter of luck. Instead, it is considered to be a matter of skills and luck. Don't waste time on finding the already reported bugs. Otherwise, you may end up being depressed by the duplication. It is suggested to spend time on understanding the functionality of the application. Also, try making notes and have a track of suspicious endpoints. You are not going to earn a satisfactory amount for the known issues if you are too early or the first one to report. If you get to know about a program within 10 to 12 hours of its launch, don't waste your time in looking for the issues at the surface level; rather, take a deep dive into the application.

Approaching the target with clarity

If you are inspecting for vulnerabilities such as CSRF, XSS, subdomains, and so on, then you may end up getting several duplicates or not getting any bug at all. It is suggested to first check their documentation and then understand the functionalities and privileges of target users.

Keeping your expectations low

Don't expect any specific reward after reporting the bug. So, whenever you report a bug, close the report and start looking for other bugs and vulnerabilities. Develop a mindset of hunting bugs instead of hunting bugs in a matter of hours.

Learning about vulnerabilities

A pretty common scenario is that a lot of new bounty hunters just start searching for bugs without having a basic knowledge of how things work. As far as my personal experience is concerned, you will not get to know how an application works and the flow of the application until and unless you know how it is built. It is vital to know how the application is built in a programming language before you start breaking it.

Keeping yourself up-to-date

Automating your vulnerabilities

In order to automate your vulnerabilities, you need to learn scripting and learning a programming language is highly recommended. JS, Python, Ruby, Bash, and so on. are some of the best scripting languages that even know some curl tricks for basic bash commands scripting.

Gaining experience with bug bounty hunting

It is saddening when a bug hunter receives no bounty. However, getting no bounty adds to experience and knowledge. You can always take bug bounty hunting in a positive way and motivate yourself.

Chaining vulnerabilities

Whenever you identify a vulnerability, the foremost question should be, what security impact is the bug going to make on the application? You can either start hunting with the goal of finding a bug or you can start hunting with a vision of looking for the best impact in the application. The former vision is an isolated one, whereas, the latter upholds a wider point of view.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime