Skip to content

Latest commit

 

History

History
132 lines (108 loc) · 8.67 KB

File metadata and controls

132 lines (108 loc) · 8.67 KB

Resources-for-Beginner-Bug-Bounty-Hunters

Basics 🤓

Before diving into bug bounty hunting, it is critical to have a solid understanding of how the internet and computer networks work. Understanding key concepts such as Transmission Control Protocol (TCP), a fundamental protocol used for transmitting data over the internet and other networks, is essential. Also, it is critical to understand networking concepts such as IP addresses, subnetting, and routing, which are all critical components of how devices communicate on a network. Another crucial concept to grasp is Domain Name System (DNS), which is in charge of converting human-readable domain names (such as google.com) into machine-readable IP addresses.

Understanding these concepts will provide a solid foundation for your bug bounty hunting journey, allowing you to better understand and navigate the various systems and networks you will encounter.

Table of Contents

  1. HTTP basics
  2. Networking basics
  3. Programming Basics
  4. Automation
  5. Linux basics
  6. Web Server Basics
  7. Computing Fundamentals
  8. Hacking Basics

HTTP basics

In order to be able to learn what and how an application works, you need to be able to understand how you are communicating with it. This section is dedicated to all the resources to understand the HTTP basics.

HTTP Basics Video Resources

Networking basics

Recon is a common terminology used in bug bounties. It’s great if you are already using tools to scan a range of IPs for open ports or find subdomain, however, you should first understand why these things matter and how they work.

Networking Basics Video Resources

-Network Fundamentals, A 19 part Video Series about Networking well explained for Beginners

Programming Basics

Being a great programmer is not a requirement to be a successful hacker. However, having the ability to make an educated guess, may increase your chances of successfully identifying and exploiting an issue. In a number of cases, you may need to automate your work or know more than just the “basics” in order to escalate a bug with a medium severity to high/critical.

  • HTML: HTML is very easy to learn and there are a ton of free resources for it. If you are interested in learning about XSS this should be your first step. If you prefer an interactive tool to learn about JavaScript, I highly recommend Codecademy or W3Schools!
  • JavaScript: Once you have familiarized yourself with HTML, you should understand JavaScript since you will be using it to exploit XSS vulnerabilities. The usage of JavaScript isn’t just limited to when you are exploring XSS, so it’s a very handy programming language to know. If you prefer an interactive tool to learn about JavaScript, I highly recommend CodeCademy!
  • SQL: You may have guessed It already, but you won’t be able to exploit complex SQL injection vulnerabilities before having any SQL knowledge. As always, if you prefer an interactive course, feel free to use CodeCademy! https://www.codecademy.com/learn/learn-sql http://www.sqlcourse.com/

Programming Basics Video Resources

Automation

You may skip this section if you believe you will never need automation or in-depth web application knowledge. However, I believe that learning bash in addition to one of the four languages listed below will allow you to work smarter rather than harder.

Automation Video Resources

Web Server Basics

If you are looking into getting started with Bug Bounties with a focus on web, I highly recommend learning the nuts and bolts of what make a website work.

After creating your own web server, I highly recommend installing a CMS (like Wordpress or drupal) on your localhost to understand how it all works.

Web Server Basics Videos

Linux Basics

Linux Basics Videos

Bug Bounty Basics

Bug Bounty Basics Videos


back to Intro Page