How To Become A Bug Bounty Hun

Step 1) Start reading!

There are some go-to books that you can buy to help you learn the basics and essentials of penetration testing and bug hunting. Since bug bounties often include website targets, we’ll focus on getting you started with Web Hacking and later we’ll branch out.

Note ->

It’s very important to focus on an area of hacking that is interesting & exciting to you. Focus on that one area and pick up new things as you go, but don’t try to be the “ultimate hacker” and learn everything. The greatest hackers on Bugcrowd have specialities and areas of interest, but they don’t know how to hack everything.
Hacking is a lifelong journey of learning.

Your two go-to books are the following:

The Web Application Hacker’s Handbook1.8k
This is an absolute must-read and considered the web-app hacker’s ‘bible’. This book starts from square one, walking you through getting Kali Linux installed all the way through using tools and finding exploits.

OWASP Testing Guide v41.9k
Highly suggested by Bugcrowd’s Jason Haddix

For further reading:

Penetration Testing702

The Hacker Playbook 2: Practical Guide to Penetration Testing450

The Tangled Web: A Guide to Securing Web Applications267

And for our Mobile hacking friends:

The Mobile Application Hacker’s Handbook336

iOS Application Security180


Step 2) Practice what you’re learning!

While you’re learning it’s important to make sure that you’re also understanding and retaining what you learn. Practicing on vulnerable applications and systems is a great way to test your skills in simulated environments. These will give you an idea of what you’ll run up against in the real world.

Hacksplaining2.2k
This is a great site to learn a bit more about various web hacking techniques and how they’re done. It’s actually more of a practical walk-through. Super useful!

Penetration Testing Practice Labs1.7k
This site has a massive list of practice apps and systems for several hacking scenarios. Use this list to find new testing labs and sites to practice your skills.


Step 3) Read tech write-ups and POCs (Proof of Concepts) from other hackers and watch tutorials on YouTube!

Now that you’ve got a baseline understanding of how to find and exploit security vulnerabilities, it’s time to start checking out what other hackers are finding in the wild. Luckily the security community is quite generous with sharing knowledge and we’ve collected a list of write-ups & tutorials:

Bug Bounty write-ups and POCs
Collection of bug reports from successful bug bounty hunters.

Bug Hunting Tutorials
Our collection of great tutorials from the Bugcrowd community and beyond.

/r/Netsec on Reddit488
Netsec on Reddit is almost exclusively tech writeups and POCs from other researchers. A fantastic resource.

JackkTutorials on YouTube614
Jackk has created many tutorials that walk you through CSRF, XSS, SQL Injection, Target Discovery and much more.

DEFCON Conference videos on YouTube211
Watch all of the talks from DEFCON over the years. Very useful resource.

Hak5 on YouTube229
Hak5 typically focuses on hardware hacking, but in addition to that they also have the ‘Metasploit Minute’ show, HakTip: NMap and much more.

Awesome-Infosec340
This is a curated list of helpful security resources that covers many different topics and areas.


Step 3-A) Gather your arsenal of tools
Tools don’t make the hacker, but they’re certainly helpful! Bugcrowd has curated an extensive list of tools that you can add to your bag of tricks:

Bugcrowd Researcher Resources – Tools


Step 4) Join the community!

You’re joining a global community of over 29,000 hackers. Luckily many of these hackers are happy to share their knowledge with a fellow polite & curious researcher.

Follow White-Hat Hackers on Twitter546
A list of bug bounty hunters that you should be following.

Join the #Bugcrowd IRC channel209 to talk to over 100 security researchers

Follow @Bugcrowd on Twitter115 to keep up with the latest infosec news

Join the Bugcrowd Forum99 for more resources & to chat with other researchers


Step 5) Start learning about bug bounties

Okay, now you’re at the point where it’s almost time to start hunting for bounties. But first, let’s learn how bug bounties work and how to get started, just to make sure we maximize our chances of success.

How to approach a target
Advice from other bug hunters that will help you find more success when approaching a bug bounty.

How to write a Great Vulnerability Report207
This will walk you through how to write a great vulnerability report. The better your report, the higher chance you will get a bounty!

How to write a Proof of Concept134
Proof of Concepts show the customer how your bug is exploited and that it works. This is crucial to being rewarded successfully.

How to Report a Bug111
Our walkthrough for reporting a bug via the Bugcrowd platform.

Bug Bounty Disclosure Policy90
These are the rules of the road. It’s very important that you understand the bounty program’s bounty brief and disclosure policy.

Read the Bounty Hunter’s Methodology

This is a presentation that @jhaddix gave at DEFCON last year and it’s a super useful look at how successful bounty hunters find bugs. Check out the Github and watch the video161.


Step 6) Get hacking!

It’s time to start hacking! When you’re new and getting started, it’s probably best not to try hacking the most popular bug bounties out there. Trying to hack Tesla Motors, Facebook, Pinterest and others will likely end in frustration for beginners, as those companies are very popular and are more secure because they receive many bug reports.

Go for the Kudos only programs572

Instead, focus on bug bounties that have likely been overlooked by others. These are often bug bounties that don’t pay rewards but instead offer kudos points on Bugcrowd. These ‘kudos points only’ programs572 are a fantastic way to get started with bug bounties and to show your skills to Bugcrowd. After you’ve submitted some valid bugs to Bugcrowd, even if they’re kudos rewards only, you will likely start receiving invites to private bounty programs. The private bounty programs are invitation only and restricted to a small number of people, which means less competition and a higher likelihood of successfully finding a bug.


Step 7) Always Be Learning & Networking

Like we mentioned earlier, hacking is a lifelong journey of learning. This is what makes this field so exciting! There are always new articles and presentations to learn from, interesting people to meet at conferences or local meetups, and new opportunities to pursue.

Bug bounties are a fantastic way to enter the InfoSec community and build your career. Use bug bounties as a way to make extra money, improve your skills, meet new people, and even build out your resume.

Remember, always act professional and treat people well. This is a small community and we like to take care of each other – you never know who you might meet!

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s