In this write up I am going to describe the path I walked through the bug hunting from the beginner level. This write-up is purely for new comers to the bug bounty community. And I hope this will help you to understand that how a researcher or bug hunter find bug in Web-Application.
lets Start With The Intro Of Bug Bounty:
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
Note: Here I have added some tools and useful Links which i use while hunting the bugs.
These are the tools & tips which I use daily for hunt a bug.
Useful YouTube Channels for learning
Linux basics, Networking basics, programming (require when you code)
Basic idea about the HTTP protocols and its headers(Request and Response)
Burpsuite, Metasploit , SqlMap , Nmap etc.
Bug Bounty Platforms
Or we can find targets from the google by searching for responsible disclosure policy of a website. I recommend to start with responsible disclosure , so there are more chances for acceptence of report. And then after a experience start with Bug Bounty Platform.
If you have chosen your target, then you should start finding the subdomain of the target.
or we can start with the IP blocks of the targets which we can get from the ASN (some of the websites are mentioned in below)
Sometimes targeting the main domain is not possible to find bugs which will frustrated to the noobs. Because the top or other researchers are already found and reported the bugs to the target. For newbie should start with the other subdomains. (its true that most common vulnerabilities are already reported by the researcher so keep in mind that we have to find a unique target and unique bug.)
As per my recon I am using the following tools to find the sub-domains for the target.
We can also find sub-domain via online recon tools. (sites are given below)
Goto this link and learn about some basics to advance concepts of Subdomain takeover vulnerability.
https://github.com/EdOverflow/can-i-take-over-xyz
https://www.shodan.io/search?query=org%3A%22Tesla+Motors%22
This will increase the target scope by searching for a Aquiasition of a target
Acquisition — -> crunchbase, wikipedia
link discovery — ->burp spidering
weighted& reverse tracker → domlink, builtwith
Here you can find the original scripts https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration
Note: Kindly replace the API key used inside the scripts which may be an invalid which results in less amount of subdomains (I recommend to use virustotal API key)
Slides are available at: https://speakerdeck.com/yamakira/esoteric-sub-domain-enumeration-techniques
The port scanning is very important to find the target which is running in non-standard or standard ports.
For port scanning I have used NMAP and Masscan and Aquatone scan.
Then some researcher start checking for sub-domain takeover vulnerability once they found sub-domains which running on the standard or non-standard ports.
This part will help us to find a application which is running on standard or non-standard ports on the target machine.
The following tools are grabbing banner if they found on the target machine which is running on specific ports. That will help us to sort list our target sub-domains.
This technology will help us if we seen any one of the HTTP responses like 401,403,404. This will show you the old stored data using Archive.
Here we can find some sensitive information even the target page is not currently accessible.
https://archieve.org/web
Parsing JS is very useful to find the directories which is used by the target. we can use these type of tools instead of brute-forcing the directory list on the target
Note: Brute-Forcing of directory also good thing to do. Always use the multiple techniques to find the directory from the targets(I found Hotsar Aws Credentials with Directory Buster & Burp Intruder)
These tools are having the ability to brute-force the different type of protocols like http, ssh,smtp, etc
Here I used Wappalyzer and build with addons on the browsers. Whatweb tool also I used to find the what technologies they used on the target.
The following tools to find technologies and technology based vulnerabilities on the target.
The testing is based on our opinion. some of them start with the xss and other vulnerabilities which we can easily found from the target.
Still you are stuck with the testing for a bug means you can start reading the following books which always helpful for Bug hunter or Application Penetration Tester.
And for our Mobile hacking friends:
I hope these books are very helpful for how to test for a bugs
CheatSheet
Pen Testing Methodologies
Popular Google Dorks Use(finding Bug Bounty Websites)
Browsers Plugins
“Special Thanks To Jhaddix For Sharing This Methodology With Us”
Twitter: https://twitter.com/Mah3Sec_