Based on Learning about Vulnerabilities

“Being a hacker is lots of fun, but it’s a kind of fun that takes lots of effort. The effort takes motivation.”

Now let’s start with the basic learning about InfoSec the first and really most important step would be to choose a proper initial path that you are going to start learning. Choosing the right path to start in Bug Bounty is very important. It totally depends upon your interest, like some people choose Web Application path first coz it’s easy to learn and go through than mobile and others… (Some of the resources are moved here from my old blog that’s I’m going to remove but these are updated and properly arranged by my experience) I’ll focus on Web, & Mobile Here coz this is what my interest is.

Before I add anything else I’ll suggest You to actually go through Hacker101 By HackerOnearrow-up-right https://www.hacker101.com/arrow-up-right And Bugcrowdarrow-up-right University https://www.bugcrowd.com/hackers/bugcrowd-university/arrow-up-right Both of these contain a Huge list of resources and lectures that can help you in even a better way than many of us can’t but as you guys are following this as well so I decided to add them here also.

Web App Security:

Before I Suggest you what to Learn first if you follow my suggested path l’ll like to tell you some ways you can practice your skills..

CTF(Capture The Flag): Now to practice for Bug Bounties you can participate in CTF challenges. Just like the name suggests “Capture The Flag” there are several challenges for you to solve which deals with real-world vulnerabilities. The more you practice on these challenges the more you will learn about the different technologies required to break into an application or a system.

For Web App, I’ll suggest you guys read the following books & guides first >https://www.packtpub.com/networking-and-servers/mastering-modern-web-penetration-testingarrow-up-right >https://www.amazon.com/Hackers-Underground-Handbook-secure-systems/dp/1451550189arrow-up-right >https://leanpub.com/web-hacking-101arrow-up-right >https://www.amazon.com/gp/product/1593275641/arrow-up-right >https://www.amazon.com/gp/product/1512214566/arrow-up-right >https://www.amazon.com/Tangled-Web-Securing-Modern-Applications-ebook/dp/B006FZ3UNI/arrow-up-right

Reading these books you will get good knowledge about Web App Penetration testing & Security testing in general and in-depth. In addition to these books, I’ll suggest you guys should really give good time reading and understanding OWASP Testing Guide & OWASP Top 10 Vulnerabilities from 2010-2017 OWASP Testing project: >https://www.owasp.org/index.php/OWASP_Testing_Projectarrow-up-right

OWASP Top 10 Project: >https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#OWASP_Top_10_for_2010arrow-up-right >https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#OWASP_Top_10_for_2013arrow-up-right >https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdfarrow-up-right

Adding a Few basic Pdfs for you guys to go through and save locally to you can keep it revised and keep learning from them. I’ll say they gonna help you almost a hundred percent of the time. So do give these a good time > Kali Linux Revealed https://docs.kali.org/pdf/kali-book-en.pdfarrow-up-right > Nmap Cheat Sheet https://s3-us-west-2.amazonaws.com/stationx-public-download/nmap_cheet_sheet_0.6.pdfarrow-up-right > Metasploit Cheat Sheet: https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdfarrow-up-right

Now by this point, I’ll say You have done Good enough research and given good time to practice and learn that you can jump into a Bug Bounty Program to test in real-life environment outside CTF, or test environments. So you can happily jump to the pages at https://bugcrowd.com/programsarrow-up-right https://hackerone.com/directoryarrow-up-right

PentesterLab There’s only one way to properly learn web penetration testing: by getting your hands dirty. PentesterLab teaches how to manually find and exploit vulnerabilities and is a good resource to learn and practice all at once.

Pentester Academy

Another Great resource to practice using online labs and learn, they also provide certifications.

And Select a Program But I’ll suggest you read till the end.

Following all of them books, testing guides you might have an idea of vulnerabilities so i’ll name a few common ones and try to give good reference to learn them easily.

Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. References to read: >https://www.imperva.com/learn/application-security/csrf-cross-site-request-forgery/?utm_campaign=Incapsula-movedarrow-up-right >https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)arrow-up-right >https://www.netsparker.com/blog/web-security/csrf-cross-site-request-forgery/arrow-up-right Some POCs:

Cross-Site Scripting (XSS)

XSS enables attackers to inject client-side scripts into web pages viewed by other users.

References to read: >https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)arrow-up-right >https://portswigger.net/web-security/cross-site-scriptingarrow-up-right >https://excess-xss.com/arrow-up-right Some POCs:

SQL Injection

SQL injection, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.

References to read: >https://www.owasp.org/index.php/SQL_Injectionarrow-up-right >https://portswigger.net/web-security/sql-injectionarrow-up-right >https://www.imperva.com/learn/application-security/sql-injection-sqli/arrow-up-right >https://www.w3schools.com/sql/sql_injection.asparrow-up-right

Some POCs:

Remote Code Execution (RCE)

In RCE an attacker’s able to execute arbitrary commands or code on a target machine or in a target Machine.

References to read: >https://www.netsparker.com/blog/web-security/remote-code-evaluation-execution/arrow-up-right >https://en.wikipedia.org/wiki/Arbitrary_code_executionarrow-up-right

Some POCs:

Insecure Direct Object Reference (IDOR)

In IDOR an application provides direct access to objects based on the user-supplied input. As a result of this vulnerability, attackers can bypass authorization and access resources in the system directly.

References to read: >https://www.bugcrowd.com/blog/how-to-find-idor-insecure-direct-object-reference-vulnerabilities-for-large-bounty-rewards/arrow-up-right >https://www.owasp.org/index.php/Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)arrow-up-right >https://www.secjuice.com/idor-insecure-direct-object-reference-definition/arrow-up-right

Some POCs:

Unrestricted File Upload

As in name unrestricted file upload allows user to upload malicious file to a system to further exploit to for Code execution

References to read: >https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/unrestricted-file-upload/arrow-up-right >https://www.owasp.org/index.php/Unrestricted_File_Uploadarrow-up-right >https://www.hackingarticles.in/5-ways-file-upload-vulnerability-exploitation/arrow-up-right

Some POCs:

XML External Entity Attack (XXE)

XXE is an attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser.

References to read: >https://portswigger.net/web-security/xxearrow-up-right >https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Prevention_Cheat_Sheetarrow-up-right >https://phonexicum.github.io/infosec/xxe.htmlarrow-up-right

Some POCs:

Local File Inclusion (LFI)

The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a “dynamic file inclusion” mechanisms implemented in the target application. The vulnerability occurs due to the use of user-supplied input without proper validation.

References to read: >https://www.owasp.org/index.php/Testing_for_Local_File_Inclusionarrow-up-right >https://www.netsparker.com/blog/web-security/local-file-inclusion-vulnerability/arrow-up-right >https://medium.com/@Aptive/local-file-inclusion-lfi-web-application-penetration-testing-cc9dc8dd3601arrow-up-right

Some POCs:

Subdomain Takeover

A process of registering a non-existing domain name to gain control over another domain.

References to read: >https://blog.securitybreached.org/2017/10/11/what-is-subdomain-takeover-vulnerability/arrow-up-right >https://0xpatrik.com/subdomain-takeover-basics/arrow-up-right >https://github.com/EdOverflow/can-i-take-over-xyzarrow-up-right

Some POCs:

Server Side Request Forgery (SSRF)

by SSRF the attacker can abuse functionality on the server to read or update internal resources.

References to read: >https://medium.com/@madrobot/ssrf-server-side-request-forgery-types-and-ways-to-exploit-it-part-1-29d034c27978arrow-up-right >https://www.owasp.org/index.php/Server_Side_Request_Forgeryarrow-up-right >https://www.netsparker.com/blog/web-security/server-side-request-forgery-vulnerability-ssrf/arrow-up-right >https://blog.detectify.com/2019/01/10/what-is-server-side-request-forgery-ssrf/arrow-up-right

Some POCs:

Some Other Interesting POCs: A huge collection at https://github.com/djadmin/awesome-bug-bountyarrow-up-right

Deserialization

Race Condition

Business Logic Flaw

Authentication Bypass

HTTP Header Injection

Money Stealing

Others

Information Disclosure

So these were some common issues that one should get a grip on and learn more and more about Following is a list of some Attacks Topics that You Should do some research and read the Blogs/reports on them.

BLOGS! You should read.

Lets get towards Blogs! There are plenty of blogs Shared by Hackers on daily basis that you can read to learn more and more…

These are some Of the Websites That I like to Visit regularly to b updated and Read Their Articles………. There are Plenty of Other Blogs, Websites That are Missing from This List so be sure to add them In comments.

YouTube Channels! You should follow.

Now Lets get Towards YouTube Channel Links… These Channels are Shared By Hackers where They Upload their Video POCs.. Watching them u can actually understand how to demonstrate these type of attacks … https://www.youtube.com/channel/UCP…arrow-up-right https://www.youtube.com/channel/UCJ…arrow-up-right https://www.youtube.com/channel/UCR…arrow-up-right https://www.youtube.com/channel/UCY…arrow-up-right https://www.youtube.com/channel/UCw…arrow-up-right https://www.youtube.com/channel/UCa…arrow-up-right https://www.youtube.com/channel/UCt…arrow-up-right https://www.youtube.com/channel/UC5…arrow-up-right https://www.youtube.com/channel/UCM…arrow-up-right https://www.youtube.com/channel/UC_…arrow-up-right https://www.youtube.com/channel/UCq…arrow-up-right https://www.youtube.com/channel/UCV…arrow-up-right https://www.youtube.com/channel/UCs…arrow-up-right https://www.youtube.com/channel/UCa…arrow-up-right https://www.youtube.com/channel/UCP…arrow-up-right https://www.youtube.com/channel/UCX…arrow-up-right https://www.youtube.com/channel/UC4…arrow-up-right https://www.youtube.com/channel/UCs…arrow-up-right https://www.youtube.com/channel/UCo…arrow-up-right https://www.youtube.com/channel/UCy…arrow-up-right https://www.youtube.com/channel/UCS…arrow-up-right https://www.youtube.com/channel/UCO…arrow-up-right https://www.youtube.com/channel/UCh…arrow-up-right https://www.youtube.com/channel/UCo…arrow-up-right https://www.youtube.com/channel/UC9…arrow-up-right https://www.youtube.com/channel/UCe…arrow-up-right https://www.youtube.com/channel/UC2…arrow-up-right https://www.youtube.com/channel/UCP…arrow-up-right https://www.youtube.com/channel/UCz…arrow-up-right

https://www.youtube.com/channel/UCq9IyPMXiwD8yBFHkxmN8zgarrow-up-right Any Channel Link Missing? Kindly add it in Comments

Another advice…… Regularly follow http://h1.nobbd.de/arrow-up-right to b updated with HackerOnearrow-up-right Public Bug reports You can learn alot from them

Alternatively, You can Join Slack Community for Hackers https://bugbounty-world.slack.com/arrow-up-right https://bugbountyforum.com/arrow-up-right

Tools! You should try out.

dnscan https://github.com/rbsec/dnscanarrow-up-right Knockpy https://github.com/guelfoweb/knockarrow-up-right Sublist3r https://github.com/aboul3la/Sublist3rarrow-up-right massdns https://github.com/blechschmidt/massdnsarrow-up-right nmap https://nmap.orgarrow-up-right masscan https://github.com/robertdavidgraham/masscanarrow-up-right EyeWitness https://github.com/ChrisTruncer/EyeWitnessarrow-up-right DirBuster https://sourceforge.net/projects/dirbuster/arrow-up-right dirsearch https://github.com/maurosoria/dirsearcharrow-up-right Gitrob https://github.com/michenriksen/gitrobarrow-up-right git-secrets https://github.com/awslabs/git-secretsarrow-up-right sandcastle https://github.com/yasinS/sandcastlearrow-up-right bucket_finder https://digi.ninja/projects/bucket_finder.phparrow-up-right GoogD0rker https://github.com/ZephrFish/GoogD0rker/arrow-up-right Wayback Machine https://web.archive.orgarrow-up-right waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050arrow-up-right Sn1per https://github.com/1N3/Sn1per/arrow-up-right XRay https://github.com/evilsocket/xrayarrow-up-right wfuzz https://github.com/xmendez/wfuzz/arrow-up-right patator https://github.com/lanjelot/patatorarrow-up-right datasploit https://github.com/DataSploit/datasploitarrow-up-right hydra https://github.com/vanhauser-thc/thc-hydraarrow-up-right changeme https://github.com/ztgrace/changemearrow-up-right MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/arrow-up-right Apktool https://github.com/iBotPeaches/Apktoolarrow-up-right dex2jar https://sourceforge.net/projects/dex2jar/arrow-up-right sqlmap http://sqlmap.org/arrow-up-right oxml_xxe https://github.com/BuffaloWill/oxml_xxe/arrow-up-right XXE Injector https://github.com/enjoiz/XXEinjectorarrow-up-right The JSON Web Token Toolkit https://github.com/ticarpi/jwt_toolarrow-up-right

Playing with JSON Web Tokens for Fun and Profitarrow-up-right ground-control https://github.com/jobertabma/ground-controlarrow-up-right ssrfDetector https://github.com/JacobReynolds/ssrfDetectorarrow-up-right LFISuit https://github.com/D35m0nd142/LFISuitearrow-up-right GitTools https://github.com/internetwache/GitToolsarrow-up-right dvcs-ripper https://github.com/kost/dvcs-ripperarrow-up-right tko-subs https://github.com/anshumanbh/tko-subsarrow-up-right HostileSubBruteforcer https://github.com/nahamsec/HostileSubBruteforcerarrow-up-right Race the Web https://github.com/insp3ctre/race-the-webarrow-up-right ysoserial https://github.com/GoSecure/ysoserialarrow-up-right PHPGGC https://github.com/ambionics/phpggcarrow-up-right CORStest https://github.com/RUB-NDS/CORStestarrow-up-right retire-js https://github.com/RetireJS/retire.jsarrow-up-right getsploit https://github.com/vulnersCom/getsploitarrow-up-right Findsploit https://github.com/1N3/Findsploitarrow-up-right bfac https://github.com/mazen160/bfacarrow-up-right WPScan https://wpscan.org/arrow-up-right CMSMap https://github.com/Dionach/CMSmaparrow-up-right Amass https://github.com/OWASP/Amassarrow-up-right Any Import Tool Missing Add in comments…

This was as much as I can think about sharing with you guys related to Web app Security in tools and vulns i have added a few things about mobile apps but the following sections contain some references you should definitely go through if you gonna join the mobile app security gang as well.

Mobile Application Security.

So hello to Mobile App Security section now let me clear this first i’m a complete noob at this section so it won’t be as detailed as the web app one.

Now The best and the very first thing I would suggest is to actually learn about the development phase of an app mainly my focus is Android APPs ( doesn’t necessarily mean that you should go for learning to develop an android but at least get to know. For this, You can go through the following Android App development tools. (My suggestion is you should actually give basic time to these) Android SDKarrow-up-right ~ The Android software development kit (SDK) includes a comprehensive set of development tools. These include a debugger, libraries, a handset emulator based on QEMU, documentation, sample code, and tutorials ADT Bundlearrow-up-right ~ The Android Developer Tools(ADT) bundle is a single download that contains everything for developers to start creating Android Application Root Tools ~ RootTools provides rooted developers with a standardized set of tools for use in the development of rooted applications.

Now if you have gone through them let’s get towards Mobile app security vulnerabilities For this I’ll suggest you first go towards OWASP Mobile Top 10arrow-up-right Giving them a good overview will definitely worth it. I’ll also Highly suggest these two Books specifically for Android & IOS app testing The Mobile Application Hacker’s Handbookarrow-up-right iOS Application Security: The Definitive Guide for Hackers and Developersarrow-up-right

For Mobile Applications, I’ll share Two of the Best places I’m currently following to learn and I would highly recommend you guys to have a look at them and giving them a proper read will definitely help you

Application Security Wiki:

Application Security Wiki is an initiative to provide all Application security-related resources to Security Researchers and developers in one place. https://appsecwiki.com/#/arrow-up-right

Learn IOS Security:

IOS Security Guide to learn and test by Prateekarrow-up-right http://damnvulnerableiosapp.com/#learnarrow-up-right

owasp-workshop-android-pentest:

Learning Penetration Testing of Android Applicationsarrow-up-right

Mobile Application Penetration Testing Cheat Sheets

The Mobile App Pentest cheat sheetarrow-up-right

Mobile penetration testing android command cheatsheetarrow-up-right

Getting Started in Android Apps Pen-testingarrow-up-right

Summing up Phase #02 of this blog I think by following these resources at and giving them good time one can get pretty good at Bug Hunting. Here are some Websites or Places where you can play CTF Challenges and practice the skills that you have learned.

Other Resources:

I saw a few friends of mine shared some really interesting and important tools, & resources so I decided to add them here as well because I’m giving some good time to them nowadays.

Tools used for Penetration testing / Red Teaming.arrow-up-right

List-pentest-tools: A curated list of network penetration testing tools.arrow-up-right

Password lists for use in penetration testing situations, broken up by TLD.arrow-up-right

Penetration tests cases, resources and guidelines.arrow-up-right

Penetration Testing notes, resources and scriptsarrow-up-right

A collection of hacking / penetration testing resources to make you better!arrow-up-right

RedTeam-Pentest-Cheatsheetsarrow-up-right

Collection of OSCP study material && tools.arrow-up-right

Kali Linux Offensive Security Certified Professional Survival Exam Guidearrow-up-right

Penetration Testing / OSCP Biggest Reference Bank / Cheatsheetarrow-up-right

An archive of everything related to OSCParrow-up-right

GitBook: OSCP RoadMaparrow-up-right

OSCP Cheatsheets, Pentesting / Red Teaming Tools and Techniquesarrow-up-right

How to prepare for OSCP complete guidearrow-up-right

OSCP All Tools are Here …!!arrow-up-right Courses at https://academy.tcm-sec.com/arrow-up-right

Last updated