SlideShare a Scribd company logo
Web Application
Security & Getting
Into Bug Bounties
Kunwar Atul (kunwaratulhax0r)
root@whoami
• Kunwar Atul
• Yet another Appsec and DevSecOps Guy
• Break – Fix – Repeat
• Part time Bug Hunter
• Synack Red Team Member
• OWASP MASVS Hindi Contributor (Ongoing Project)
• DevSecOps University Contributor
• I Love Knowing What’s Going On (emerging vulns, tools, PoC), CTFs,
Offensive Security Work, Cricket, and no compromise with food and
coffee.
• Meme Lover
• Social media- kunwaratulhax0r
Agenda
• What Are Bug Bounty Programs?
• Bug Bounty Programs History
• Where Is India in Bug Bounty
• Why Bug Bounty Programs?
• Popular Bug Bounty Programs
• Types of Bug Bounty Programs
• Basic Technical Things to Get
Started
• Choosing Your Initial Path
• Resources to Learn
• Sample Report Format
• Vulnerabilities Priorities
• Don’t Forget to Read Terms
• Practice
• References
• Q/A
• Thanks
What are Bug Bounty Programs
• A bug bounty program, also called a
vulnerability rewards program (VRP), is a
crowdsourcing initiative that rewards
individuals for discovering and reporting
software bugs.
Bug Bounty Program History
Source: https://blog.cobalt.io/the-history-of-bug-bounty-programs-50def4dcaab3
Where is India in Bug Bounty
• “As long as there are software vulnerabilities, there will be millionaire hackers!”- Mårten Mickos (CEO
HackerOne).
• No one will be able to tell you everything about this field, It’s a long path but you have to travel it alone with
help from others. (Sudhanshu Rajbhar)
• If you think you will become successful overnight or over the week or over a month, this is not a field you
should join. Doing bug bounties are very competitive, it might take a year at least to do good in bug bounty.
you have to continue your learning, sharing & more and more practice. You must-have curiousness to learn
about new things and explore the field on your own. There is huge education content out there for free.
(Sudhanshu Rajbhar)
Why Bug Bounty Programs (Company Wise)
1. More eyes than you could ever pay. When you open it to the crowd, you get a lot more people looking over your system than you could ever
hire. And you only pay the ones who find problems.
2. Building it right the first time is a myth. The best developers in the world still leave unexpected vulnerabilities open. You can dream of
bulletproof code, or you can be prepared in case your dreams don't come true.
3. It can save you money. Breaches are expensive to recover from. Way more expensive than a few thousand dollars for a bounty. Plus some
bugs involve eliminating pricing problems or unearned discounts.
4. It's not a crazy new thing. Little companies like Google, Facebook, Microsoft, Mozilla and PayPal all have bug bounties, so you won't have to
do a ton of explaining to bug hunters. They know the drill.
5. You don't have to do it all yourself. HackerOne provides a hosted bug bounty platform where you can define parameters eligibility and
rewards. Similar services are also available from Cobalt and Bugcrowd.
Source: https://www.techrepublic.com/article/top-5-reasons-you-need-a-bug-bounty-program/
Why Bug Bounty Programs (Researcher Wise)
• Every time it will be a new learning.
• New Challenges
• New Technology
• And of course $$$$$$
Popular Bug Bounty Programs
• BugCrowd
• HacekrOne
• Synack (Require written exams, practical exams and BG checks)
• Cobalt
• ZeroCopter (Invite Base)
• Intigriti
• YesWeHack
Types of Bug Bounty Programs
• Only Hall of Fame
• Hall of Fame With Certificate of Appreciation
• Hall of Fame with Swags / only Swags
• Hall of Fame with Bounty
• Only Bounty
Basic Technical Things to Get Started
• Web & Network Basics
• Linux Commands
• Web App Technologies
• Learn Basics of HTML, Java, PHP, Python, Java Script
• OWASP Top 10
Choosing Your Initial Path
• Web Application Pentesting
• Mobile Application Pentesting (Android/iOS)
Resources to Learn
• Web Basics Resources
• https://www.tutorialspoint.com/web_de
velopers_guide/web_basic_concepts.ht
m
• https://developers.google.com/web/fun
damentals/security/
• http://www.alphadevx.com/a/7-The-
Basics-of-Web-Technologies
• http://www.cs.kent.edu/~svirdi/Ebook/
wdp/ch01.pdf
• HTTP Resources
• https://www.w3.org/Protocols/
• https://www.w3schools.com/whatis/whatis_htt
p.asp
• https://www.tutorialspoint.com/http/http_stat
us_codes.htm
• https://www.tutorialspoint.com/http/http_url_
encoding.htm
• https://www.tutorialspoint.com/http/http_requ
ests.htm
• https://www.tutorialspoint.com/http/http_resp
onses.htm
• https://www.hacker101.com/sessions/web_in_
depth
Resources to Learn
• Networking Resources
• https://commotionwireless.net/docs/cck/networ
king/learn-networking-basics/
• https://commotionwireless.net/docs/cck/networ
king/learn-networking-basics/
• https://www.slideshare.net/variwalia/basic-to-
advanced-networking-tutorials
• https://www.cisco.com/c/en/us/solutions/small-
business/resource-
center/networking/networking-basics.html
• http://www.penguintutor.com/linux/basic-
network-reference
• https://www.utilizewindows.com/list-of-
common-network-port-numbers/
• https://code.tutsplus.com/tutorials/an-
introduction-to-learning-and-using-dns-
records–cms-24704
• https://www.digitalocean.com/community/tutori
als/an-introduction-to-networking-terminology-
interfaces-and-protocols
• Linux Commands:
• http://linuxcommand.org/
• HTML
• https://www.w3schools.com/html/
• https://www.codecademy.com/learn/learn-html
• https://learn.shayhowe.com/advanced-html-css/
• https://htmldog.com/guides/html/advanced/
• PHP
• https://www.w3schools.com/php/
• https://stackify.com/learn-php-tutorials/
• https://www.codecademy.com/learn/learn-php
• https://www.guru99.com/php-tutorials.html
• https://www.codecademy.com/learn/paths/web
-development
Resources to Learn
• C/C++
• https://www.youtube.com/watch?v=vLnP
wxZdW4Y
• https://www.learncpp.com/
• https://www.codecademy.com/learn/learn-
c-plus-plus
• https://www.sololearn.com/Course/CPlus
Plus/
• JavaScript
• https://www.youtube.com/watch?v=PkZN
o7MFNFg
• https://www.codecademy.com/learn/introd
uction-to-javascript
• https://learnjavascript.today/
• https://www.thebalancecareers.com/learn
-javascript-online-2071405
• SQL
• https://www.youtube.com/watch?v=HXV3ze
QKqGY
• https://www.w3schools.com/sql/
• https://www.codecademy.com/learn/learn-
sql
Resources to Learn
• Bash
• https://www.tutorialspoint.com/unix/shell_
scripting.htm
• https://www.learnshell.org/
• https://medium.com/quick-code/top-
tutorials-to-learn-shell-scripting-on-linux-
platform-c250f375e0e5
• Python
• https://realpython.com/
• https://comparite.ch/python-courses
• https://docs.python.org/3/tutorial/
• https://drive.google.com/drive/u/0/folders/0
ByWO0aO1eI_MT1E1NW91VlJ2TVk?fbclid=I
wAR35WNZwBQudINaZ10I5ZA2YDQdtNXSEw
RyEiLEK91_csJ7ekN1ut7AQNeQ
• Ruby
• https://www.learnrubyonline.org/
• https://www.codecademy.com/learn/learn-
ruby
• Golang
• https://tour.golang.org/welcome/1
• https://www.udemy.com/learn-go-the-
complete-bootcamp-course-golang/
Resources to Learn
• Web Pentesting
• OWASP Testing Guide
• OWASP Top -10 2013
• OWASP Top -10 2017
• Web Application Hackers Handbook
• Web Hacking 101
• Mastering Modern Web Penetration Testing
• Breaking Into Information Security
• Mobile Pentesting
• Mobile Application Hacker’s Handbook
• Manifest Security By Aditya Agarwal
• Application Security Wiki By Aditya Agarwal
• The Mobile Application Security Guide
• Mobile Application Verification Standards
Resources to Learn
• YouTube Videos
• HOW TO GET STARTED IN BUG BOUNTY (9x PRO TIPS)
• Bug Bounty Hunting - Tools I Use
• LevelUp 0x02 - Bug Bounty Hunter Methodology v3
• Bug Bounty 101 - How To Become A Bug Hunter - Bug Bounty Talks
• The Truth About Recon (Bug Bounty Tips)
• BUGBOUNTY PRO TIPS FOR BEGINNERS: With Nahamsec
Sample Report Format
• Vulnerability Name
• Vulnerability Severity and CVSS Score
• Vulnerability Description
• Vulnerable URL
• Impact
• Payload
• Steps to Reproduce
• Mitigation
Vulnerabilities Priorities
• P1 -Critical: Vulnerabilities that cause a privilege escalation from unprivileged to admin
or allow for remote code execution, financial theft, etc.
• P2 -High: Vulnerabilities that affect the security of the software and impact the
processes it supports.
• P3 -Medium: Vulnerabilities that affect multiple users and require little or no user
interaction to trigger.
• P4 -Low: Vulnerabilities that affect singular users and require interaction or significant
prerequisites to trigger (MitM) to trigger.
• P5 -Informational: Non-exploitable vulnerabilities in functionality. Vulnerabilities that are
by design or are deemed an acceptable business risk to the customer.
Don’t Forget to Read Terms
• Before you start testing, please read the disclosure and terms plus keep within
the scope, often I see newbies go out of scope, you don't want to start any
dramas and a headache, please be responsible for yourself and the actions you
take. Give adequate time for the companies to act on any bugs that need fixing
and not to post a vulnerability until its fixed publicly.
Practice! Practice! and
Practice
1. Hacker101
2. Web Security Academy by PortSwigger
3. Bug Bounty Notes
4. Pentesterlab
5. Hackthebox
6. Damn Vulnerable Web application
7. XSS Game by Google.
8. Vulnhub
9. hack me
10. And Many More ………..
References
1.https://medium.com/inbughunters/getting-started-in-bug-bounty-7052da28445a
2.https://medium.com/@impratikdabhi/how-to-get-started-into-bug-bounty-
1be52b3064e0
3.https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-
bounty-hunting/
4.https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-
bounty-hunter/1102
Q/A
Thank You Everyone

More Related Content

PPTX
Android pentesting the hackers-meetup
PPTX
Bug Bounty 101
PPTX
Bug bounties - cén scéal?
PDF
Smart Sheriff, Dumb Idea, the wild west of government assisted parenting
PDF
Attacking and Defending Mobile Applications
PPTX
What? Why? Who? How? Of Application Security Testing
PPTX
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Android pentesting the hackers-meetup
Bug Bounty 101
Bug bounties - cén scéal?
Smart Sheriff, Dumb Idea, the wild west of government assisted parenting
Attacking and Defending Mobile Applications
What? Why? Who? How? Of Application Security Testing
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...

What's hot (20)

PDF
PPTX
Cache is King
PPTX
Essential security measures in ASP.NET MVC
PPTX
Presentation on Top 10 Vulnerabilities in Web Application
PPTX
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
PDF
Cred stealing emails bsides austin_2018 v1.0
PDF
Owasp advanced mobile-application-code-review-techniques-v0.2
PDF
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
PDF
Bug Bounty Hunter's Manifesto V1.0
PPTX
Web application security: Threats & Countermeasures
PDF
AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers
PDF
Logging for Hackers v1.0
PDF
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
PDF
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
PDF
Finding attacks with these 6 events
PPTX
Wireless Pentesting: It's more than cracking WEP
PPTX
LKNOG3 - Bug Bounty
PDF
Web Security - Introduction
PDF
Daniel billing exploring the security testers toolbox
PDF
Deeplook into apt and how to detect and defend v1.0
Cache is King
Essential security measures in ASP.NET MVC
Presentation on Top 10 Vulnerabilities in Web Application
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
Cred stealing emails bsides austin_2018 v1.0
Owasp advanced mobile-application-code-review-techniques-v0.2
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
Bug Bounty Hunter's Manifesto V1.0
Web application security: Threats & Countermeasures
AppSec Tel Aviv - OWASP Top 10 For JavaScript Developers
Logging for Hackers v1.0
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
Finding attacks with these 6 events
Wireless Pentesting: It's more than cracking WEP
LKNOG3 - Bug Bounty
Web Security - Introduction
Daniel billing exploring the security testers toolbox
Deeplook into apt and how to detect and defend v1.0
Ad

Similar to Web Application Security And Getting Into Bug Bounties (20)

PPTX
Basics of getting Into Bug Bounty Hunting
PDF
Yet another talk on bug bounty
PPTX
Getting_Started_with_Bug_Bounty program.
PDF
Bug Bounty Career.pdf
PDF
Bug Bounty Blueprint : A Beginner's Guide
PDF
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
PPTX
Bug Bounty - Play For Money
PDF
Hunting bugs - C0r0n4con
PDF
Owasp LA
PPTX
Nbt con december-2014-slides
PPTX
Nbt con december-2014-slides
PPTX
ABCD of Bugbounty.pptx
PPTX
Bug bounty cash for hack
PDF
Bug Bounty Guide Tools and Resource.pdf
PPTX
Crypto Night at CSUS - Bug Bounties
PPTX
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
PDF
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
PPTX
7 Bug Bounty Myths, BUSTED
PPTX
bug_bountybug_bountybug_bountybug_bounty.pptx
PDF
BSides LA/PDX
Basics of getting Into Bug Bounty Hunting
Yet another talk on bug bounty
Getting_Started_with_Bug_Bounty program.
Bug Bounty Career.pdf
Bug Bounty Blueprint : A Beginner's Guide
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Bug Bounty - Play For Money
Hunting bugs - C0r0n4con
Owasp LA
Nbt con december-2014-slides
Nbt con december-2014-slides
ABCD of Bugbounty.pptx
Bug bounty cash for hack
Bug Bounty Guide Tools and Resource.pdf
Crypto Night at CSUS - Bug Bounties
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
7 Bug Bounty Myths, BUSTED
bug_bountybug_bountybug_bountybug_bounty.pptx
BSides LA/PDX
Ad

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Programs and apps: productivity, graphics, security and other tools
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
sap open course for s4hana steps from ECC to s4
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Dropbox Q2 2025 Financial Results & Investor Presentation

Web Application Security And Getting Into Bug Bounties

  • 1. Web Application Security & Getting Into Bug Bounties Kunwar Atul (kunwaratulhax0r)
  • 2. root@whoami • Kunwar Atul • Yet another Appsec and DevSecOps Guy • Break – Fix – Repeat • Part time Bug Hunter • Synack Red Team Member • OWASP MASVS Hindi Contributor (Ongoing Project) • DevSecOps University Contributor • I Love Knowing What’s Going On (emerging vulns, tools, PoC), CTFs, Offensive Security Work, Cricket, and no compromise with food and coffee. • Meme Lover • Social media- kunwaratulhax0r
  • 3. Agenda • What Are Bug Bounty Programs? • Bug Bounty Programs History • Where Is India in Bug Bounty • Why Bug Bounty Programs? • Popular Bug Bounty Programs • Types of Bug Bounty Programs • Basic Technical Things to Get Started • Choosing Your Initial Path • Resources to Learn • Sample Report Format • Vulnerabilities Priorities • Don’t Forget to Read Terms • Practice • References • Q/A • Thanks
  • 4. What are Bug Bounty Programs • A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
  • 5. Bug Bounty Program History Source: https://blog.cobalt.io/the-history-of-bug-bounty-programs-50def4dcaab3
  • 6. Where is India in Bug Bounty
  • 7. • “As long as there are software vulnerabilities, there will be millionaire hackers!”- Mårten Mickos (CEO HackerOne). • No one will be able to tell you everything about this field, It’s a long path but you have to travel it alone with help from others. (Sudhanshu Rajbhar) • If you think you will become successful overnight or over the week or over a month, this is not a field you should join. Doing bug bounties are very competitive, it might take a year at least to do good in bug bounty. you have to continue your learning, sharing & more and more practice. You must-have curiousness to learn about new things and explore the field on your own. There is huge education content out there for free. (Sudhanshu Rajbhar)
  • 8. Why Bug Bounty Programs (Company Wise) 1. More eyes than you could ever pay. When you open it to the crowd, you get a lot more people looking over your system than you could ever hire. And you only pay the ones who find problems. 2. Building it right the first time is a myth. The best developers in the world still leave unexpected vulnerabilities open. You can dream of bulletproof code, or you can be prepared in case your dreams don't come true. 3. It can save you money. Breaches are expensive to recover from. Way more expensive than a few thousand dollars for a bounty. Plus some bugs involve eliminating pricing problems or unearned discounts. 4. It's not a crazy new thing. Little companies like Google, Facebook, Microsoft, Mozilla and PayPal all have bug bounties, so you won't have to do a ton of explaining to bug hunters. They know the drill. 5. You don't have to do it all yourself. HackerOne provides a hosted bug bounty platform where you can define parameters eligibility and rewards. Similar services are also available from Cobalt and Bugcrowd. Source: https://www.techrepublic.com/article/top-5-reasons-you-need-a-bug-bounty-program/
  • 9. Why Bug Bounty Programs (Researcher Wise) • Every time it will be a new learning. • New Challenges • New Technology • And of course $$$$$$
  • 10. Popular Bug Bounty Programs • BugCrowd • HacekrOne • Synack (Require written exams, practical exams and BG checks) • Cobalt • ZeroCopter (Invite Base) • Intigriti • YesWeHack
  • 11. Types of Bug Bounty Programs • Only Hall of Fame • Hall of Fame With Certificate of Appreciation • Hall of Fame with Swags / only Swags • Hall of Fame with Bounty • Only Bounty
  • 12. Basic Technical Things to Get Started • Web & Network Basics • Linux Commands • Web App Technologies • Learn Basics of HTML, Java, PHP, Python, Java Script • OWASP Top 10
  • 13. Choosing Your Initial Path • Web Application Pentesting • Mobile Application Pentesting (Android/iOS)
  • 14. Resources to Learn • Web Basics Resources • https://www.tutorialspoint.com/web_de velopers_guide/web_basic_concepts.ht m • https://developers.google.com/web/fun damentals/security/ • http://www.alphadevx.com/a/7-The- Basics-of-Web-Technologies • http://www.cs.kent.edu/~svirdi/Ebook/ wdp/ch01.pdf • HTTP Resources • https://www.w3.org/Protocols/ • https://www.w3schools.com/whatis/whatis_htt p.asp • https://www.tutorialspoint.com/http/http_stat us_codes.htm • https://www.tutorialspoint.com/http/http_url_ encoding.htm • https://www.tutorialspoint.com/http/http_requ ests.htm • https://www.tutorialspoint.com/http/http_resp onses.htm • https://www.hacker101.com/sessions/web_in_ depth
  • 15. Resources to Learn • Networking Resources • https://commotionwireless.net/docs/cck/networ king/learn-networking-basics/ • https://commotionwireless.net/docs/cck/networ king/learn-networking-basics/ • https://www.slideshare.net/variwalia/basic-to- advanced-networking-tutorials • https://www.cisco.com/c/en/us/solutions/small- business/resource- center/networking/networking-basics.html • http://www.penguintutor.com/linux/basic- network-reference • https://www.utilizewindows.com/list-of- common-network-port-numbers/ • https://code.tutsplus.com/tutorials/an- introduction-to-learning-and-using-dns- records–cms-24704 • https://www.digitalocean.com/community/tutori als/an-introduction-to-networking-terminology- interfaces-and-protocols • Linux Commands: • http://linuxcommand.org/ • HTML • https://www.w3schools.com/html/ • https://www.codecademy.com/learn/learn-html • https://learn.shayhowe.com/advanced-html-css/ • https://htmldog.com/guides/html/advanced/ • PHP • https://www.w3schools.com/php/ • https://stackify.com/learn-php-tutorials/ • https://www.codecademy.com/learn/learn-php • https://www.guru99.com/php-tutorials.html • https://www.codecademy.com/learn/paths/web -development
  • 16. Resources to Learn • C/C++ • https://www.youtube.com/watch?v=vLnP wxZdW4Y • https://www.learncpp.com/ • https://www.codecademy.com/learn/learn- c-plus-plus • https://www.sololearn.com/Course/CPlus Plus/ • JavaScript • https://www.youtube.com/watch?v=PkZN o7MFNFg • https://www.codecademy.com/learn/introd uction-to-javascript • https://learnjavascript.today/ • https://www.thebalancecareers.com/learn -javascript-online-2071405 • SQL • https://www.youtube.com/watch?v=HXV3ze QKqGY • https://www.w3schools.com/sql/ • https://www.codecademy.com/learn/learn- sql
  • 17. Resources to Learn • Bash • https://www.tutorialspoint.com/unix/shell_ scripting.htm • https://www.learnshell.org/ • https://medium.com/quick-code/top- tutorials-to-learn-shell-scripting-on-linux- platform-c250f375e0e5 • Python • https://realpython.com/ • https://comparite.ch/python-courses • https://docs.python.org/3/tutorial/ • https://drive.google.com/drive/u/0/folders/0 ByWO0aO1eI_MT1E1NW91VlJ2TVk?fbclid=I wAR35WNZwBQudINaZ10I5ZA2YDQdtNXSEw RyEiLEK91_csJ7ekN1ut7AQNeQ • Ruby • https://www.learnrubyonline.org/ • https://www.codecademy.com/learn/learn- ruby • Golang • https://tour.golang.org/welcome/1 • https://www.udemy.com/learn-go-the- complete-bootcamp-course-golang/
  • 18. Resources to Learn • Web Pentesting • OWASP Testing Guide • OWASP Top -10 2013 • OWASP Top -10 2017 • Web Application Hackers Handbook • Web Hacking 101 • Mastering Modern Web Penetration Testing • Breaking Into Information Security • Mobile Pentesting • Mobile Application Hacker’s Handbook • Manifest Security By Aditya Agarwal • Application Security Wiki By Aditya Agarwal • The Mobile Application Security Guide • Mobile Application Verification Standards
  • 19. Resources to Learn • YouTube Videos • HOW TO GET STARTED IN BUG BOUNTY (9x PRO TIPS) • Bug Bounty Hunting - Tools I Use • LevelUp 0x02 - Bug Bounty Hunter Methodology v3 • Bug Bounty 101 - How To Become A Bug Hunter - Bug Bounty Talks • The Truth About Recon (Bug Bounty Tips) • BUGBOUNTY PRO TIPS FOR BEGINNERS: With Nahamsec
  • 20. Sample Report Format • Vulnerability Name • Vulnerability Severity and CVSS Score • Vulnerability Description • Vulnerable URL • Impact • Payload • Steps to Reproduce • Mitigation
  • 21. Vulnerabilities Priorities • P1 -Critical: Vulnerabilities that cause a privilege escalation from unprivileged to admin or allow for remote code execution, financial theft, etc. • P2 -High: Vulnerabilities that affect the security of the software and impact the processes it supports. • P3 -Medium: Vulnerabilities that affect multiple users and require little or no user interaction to trigger. • P4 -Low: Vulnerabilities that affect singular users and require interaction or significant prerequisites to trigger (MitM) to trigger. • P5 -Informational: Non-exploitable vulnerabilities in functionality. Vulnerabilities that are by design or are deemed an acceptable business risk to the customer.
  • 22. Don’t Forget to Read Terms • Before you start testing, please read the disclosure and terms plus keep within the scope, often I see newbies go out of scope, you don't want to start any dramas and a headache, please be responsible for yourself and the actions you take. Give adequate time for the companies to act on any bugs that need fixing and not to post a vulnerability until its fixed publicly.
  • 23. Practice! Practice! and Practice 1. Hacker101 2. Web Security Academy by PortSwigger 3. Bug Bounty Notes 4. Pentesterlab 5. Hackthebox 6. Damn Vulnerable Web application 7. XSS Game by Google. 8. Vulnhub 9. hack me 10. And Many More ………..
  • 25. Q/A