Book Image

Bug Bounty Hunting Essentials

By : Carlos A. Lozano, Shahmeer Amir
Book Image

Bug Bounty Hunting Essentials

By: Carlos A. Lozano, Shahmeer Amir

Overview of this book

Bug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers. This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed. This book will get you started with bug bounty hunting and its fundamentals.
Table of Contents (20 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Chapter 12. Top Bug Bounty Hunting Tools

The most important thing in looking for vulnerabilities is the experience and the knowledge gained; however, the use of different tools also plays an important factor. It is not the same as spending a lot of hours reviewing HTTP requests manually and eating tacos at your desk. We will be configuring a little list with testing strings, applying filters to HTTP responses, and finding more vulnerabilities. And remember that you are in a race with other bug bounty hunters, and it is important to have the capability to cover most of the application's surface in order to be more successful.

In this chapter, we will review the most used tools for web application security assessments. In general; most of them are open source and free; we will also mention some tools that are licensed, which I think add great value in bug bounty hunting.

We will cover the following topics in this chapter:

  • What tools to use
  • How to use them
  • Where to use them