Find a file
2019-05-10 21:12:18 +00:00
README.md Readme typo 2019-05-10 21:12:18 +00:00

Resources-for-Beginner-Bug-Bounty-Hunters

Intro

There are a number of new hackers joining the community on a regular basis and this raises the question of "How do I get started and what are some good resources?" and we hope to help with those questions using this repository. As a hacker, there a ton of techniques, terminologies, and topics you need to familiarize yourself with to understand how an application works. Cody Brocious (@daeken) and I put these resources together in order to help new hackers with resources to learn the basics of Web Application Security.

We understand that there are more resources other than the ones we have listed and we hope to cover more resources in the near future!

HTTP basics

In order to be able to learn what and how an application works, you need to be able to understand how you are communicating with it. This section is dedicated to all the resources to understand the HTTP basics.

Networking basics

Recon is a common terminology used in bug bounties. Its great if you are already using tools to scan a range of IPs for open ports or find subdomain, however, you should first understand why these things matter and how they work.

Programming Basics

Being a great programmer is not a requirement to be a successful hacker. However, having the ability to make an educated guess, may increase your chances of successfully identifying and exploiting an issue. In a number of cases, you may need to automate your work or know more than just the “basics” in order to escalate a bug with a medium severity to high/critical.

  • HTML: HTML is very easy to learn and there are a ton of free resources for it. If you are interested in learning about XSS this should be your first step. If you prefer an interactive tool to learn about Javascript, I highly recommend Codecademy! https://www.codecademy.com/learn/learn-html https://www.w3schools.com/html/

  • JavaScript: Once you have familiarized yourself with HTML, you should understand Javascript since you will be using it to exploit XSS vulnerabilities. The usage of Javascript isnt just limited to when you are exploring XSS, so its a very handy programming language to know. If you prefer an interactive tool to learn about Javascript, I highly recommend Codecademy! https://www.codecademy.com/learn/introduction-to-javascript

  • SQL: You may have guessed It already, but you wont be able to exploit complex SQL injection vulnerabilities before having any SQL knowledge. As always, if you prefer an interactive course, feel free to use Codecademy! https://www.codecademy.com/learn/learn-sql http://www.sqlcourse.com/

###Automation You are welcome to skip this section if you think youll never need any automation or in depth web application knowledge. However I think learning bash in addition to one the following four languages may help you work smarter rather than harder.

Misc

Vulnerability Types

Need a description here

Cross-Site Scripting XSS

As we start to build this repository, we'll be adding more vulnerability types and resources for each one. XSS is a great place to start as it's one of the most popular and easiest vulnerabilities to find in a web application.

Hands on material

Blog posts

You can find a ton of awesome XSS reports by searching through the HackerOne Hacktivity Page (https://hackerone.com/hacktivity?querystring=XSS). Here are some more complex and some of my favorite XSS related blog posts:

DOM XSS

https://hackerone.com/reports/297968 https://hackerone.com/reports/168165 https://www.rafaybaloch.com/2017/06/a-tale-of-dom-based-xss-in-paypal.html

Stored XSS

https://blog.bentkowski.info/2018/09/another-xss-in-google-colaboratory.html https://medium.com/@Alra3ees/google-adwords-3133-7-stored-xss-27bb083b8d27 https://opnsec.com/2018/03/stored-xss-on-facebook/ https://klikki.fi/adv/yahoo.html https://klikki.fi/adv/yahoo2.html https://hackerone.com/reports/422043 https://sites.google.com/site/bughunteruniversity/best-reports/account-recovery-xss

CSP Bypass

https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html