Bug-Bounty-RoadMap

πŸ›‘️ Bug Bounty Beginner's Roadmap


Created by KIRAN KUMAR K

Security Engineer | Content Creator

Welcome to the ultimate beginner's roadmap for getting started with Bug Bounties. This guide is for everyone who wants to step into the ethical hacking and bug bounty space. Contributions are welcome!

πŸ“ Note: Bug bounty hunting is evolving rapidly. Easy bugs ("low hanging fruits") are often already automated or duplicated. To succeed, stay focused, consistent, and keep learning.


πŸ” Introduction

πŸ”§ What is a Bug?

A security bug or vulnerability is a flaw in software/hardware that can be exploited, potentially affecting the system's confidentiality, integrity, or availability.

πŸ’° What is a Bug Bounty?

A Bug Bounty Program rewards hackers for finding and responsibly disclosing security bugs in an organization's digital assets.

🎁 What Are the Rewards?

Rewards can include:

  • πŸ’΅ Cash: $50 to $50,000+

  • 🎁 Swags: Apparel, stickers, badges

  • 🎟️ Subscriptions: Netflix, Prime, etc.

  • 🧾 Coupons, gift cards, or recognition


πŸ“š What to Learn

πŸ–₯️ Computer Fundamentals

🌐 Computer Networking

πŸ’» Operating Systems

πŸ§‘‍πŸ’» Command Line

Windows

Linux


πŸ‘¨‍πŸ’» Programming Skills

C

Python

JavaScript

PHP


πŸ“– Where to Learn From?

πŸ“˜ Books

✍️ Writeups

πŸ“š Blogs

🧠 Forums

🌐 Official Resources


πŸŽ₯ YouTube Channels

English

Hindi


πŸ§ͺ Practice Platforms (CTFs)


πŸ” Bug Bounty Platforms

Crowdsourcing Platforms

Individual Programs


πŸ› ️ PRACTICE! PRACTICE! and PRACTICE!

🎯 Capture The Flag (CTF) Platforms

πŸ“‘ Online Labs for Hands-On Practice

πŸ’» Offline Labs / Local Practice Environments


🧰 Tools and Services to Use

🌐 Servers and Network Asset Discovery

  • Shodan — Search Engine for the Internet of Everything
  • ZoomEye — Global cyberspace mapping
  • Natlas — Scaling network scanning
  • Netlas.io — Discover and monitor online assets
  • FOFA — Cyberspace mapping
  • Quake — Cyberspace surveying and mapping system
  • Hunter — Internet search engine for security researchers

πŸ›‘️ Vulnerability Databases & Intelligence

  • NIST NVD — US National Vulnerability Database
  • MITRE CVE — Catalog of publicly disclosed vulnerabilities
  • osv.dev — Open Source Vulnerabilities
  • CVEDetails — Comprehensive vulnerability datasource
  • VulnIQ — Vulnerability intelligence & management
  • Vulmon — Vulnerability and exploit search engine
  • VulDB — Leading vulnerability database
  • cnvd.org.cn — Chinese National Vulnerability Database
  • VARIoT — IoT vulnerabilities database

πŸ’£ Exploit Databases and Resources

  • LOLBAS — Living Off The Land Binaries, Scripts & Libraries
  • GTFOBins — Unix binaries for privilege escalation
  • GTFOArgs — Unix binaries argument injection
  • LOLDrivers — Vulnerable & malicious Windows drivers
  • PwnWiki — Post-exploitation techniques
  • LOOBins — macOS built-in binaries for attacks
  • WADComs — Offensive security tools cheat sheet
  • LOLAPPS — Applications for exploitation


πŸ“ Bug Bounty Report Format

  • Title
    • The first impression is the last impression, the security engineer looks at the title first and he should be able to identify the issue.
    • Write about what kind of functionality you can able to abuse or what kind of protection you can bypass. Write in just one line.
    • Include the Impact of the issue in the title if possible.
  • Description
    • This component provides details of the vulnerability, you can explain the vulnerability here, write about the paths, endpoints, error messages you got while testing. You can also attach HTTP requests, vulnerable source code.
  • Steps to Reproduce
    • Write the stepwise process to recreate the bug. It is important for an app owner to be able to verify what you've found and understand the scenario.
    • You must write each step clearly in-order to demonstrate the issue. that helps security engineers to triage fast.
  • Proof of Concept
    • This component is the visual of the whole work. You can record a demonstration video or attach screenshots.
  • Impact
    • Write about the real-life impact, How an attacker can take advantage if he/she successfully exploits the vulnerability.
    • What type of possible damages could be done? (avoid writing about the theoretical impact)
    • Should align with the business objective of the organization

πŸ’‘ Some additional Tips

  1. Don't do bug bounty as a full time in the beginning (although I suggest don't do it full time at any point). There is no guarantee to get bugs every other day, there is no stability. Always keep multiple sources of income (bug bounty not being the primary).
  2. Stay updated, learning should never stop. Join twitter, follow good people, maintain the curiosity to learn something new every day. Read writeups, blogs and keep expanding your knowledge.
  3. Always see bug bounty as a medium to enhance your skills. Money will come only after you have the skills. Take money as a motivation only.
  4. Don't be dependent on automation. You can't expect a tool to generate money for you. Automation is everywhere. The key to success in Bug Bounty is to be unique. Build your own methodology, learn from others and apply on your own.
  5. Always try to escalate the severity of the bug, Keep a broader mindset. An RCE always has higher impact than arbitrary file upload.
  6. It's not necessary that a vulnerability will be rewarded based on the industry defined standard impact. The asset owners rate the issue with a risk rating, often calculated as impact * likelyhood (exploitability). For example, an SQL Injection by default has a Critical impact, but if the application is accessible only inside the organization VPN and doesn't contain any user data/PII in the database, the likelyhood of the exploitation is reduced, so does the risk.
  7. Stay connected to the community. Learn and contribute. There is always someone better than you in something. don't miss an opportunity to network. Join forums, go to conferences and hacking events, meet people, learn from their experiences.
  8. Always be helpful.


Next Post Previous Post
No Comment
Add Comment
comment url