Book Image

Bug Bounty Hunting Essentials

By : Carlos A. Lozano, Shahmeer Amir
Book Image

Bug Bounty Hunting Essentials

By: Carlos A. Lozano, Shahmeer Amir

Overview of this book

Bug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers. This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed. This book will get you started with bug bounty hunting and its fundamentals.
Table of Contents (20 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Social networks and blogs


Logging on to social networking sites and going through the blogs of other bug bounty hunters is one of the best ways to stay up-to-date with all the developments happening in the field of security.

Exploitware Labs

Exploitware Labs (https://www.facebook.com/ExWareLabs/) is a Facebook page that publishes daily information about new vulnerabilities, news, projects, and proofs of concept.

Philippe Hare Wood

Philippe Hare Wood (https://philippeharewood.com/) is a bug bounty hunter who has discovered vulnerabilities mainly on Facebook and Instagram. He also publishes the solutions to some CTFs.

PortSwigger's blog

PortSwigger (https://portswigger.net/blog), the company that developed Burp Suite, has its own blog, where people post information about extensions, analyse with Burp Suite, and development around Burp Suite.