Monke disclosed his whole bug bounty methodology and included many interesting topics like program selection, scope selection or tools used but also important non-technical aspects like mental health and collaboration....
Bug Bounty
The 3 biggest lessons from my first LHE
I’ve been a participant of the h1-702 Live Hacking Event in Las Vegas and it was an unforgettable experience! This one week profoundly changed the way I see bug bounty. In this article, I’ll describe my biggest lessons from the LHE. Of course, most technical things...
The secret to finding many Criticals – Alex Chapman – BBRD podcast #14
Finding criticals is hard. Often, you can only target some users, need interaction or the impact isn't that high. However, there's one man that has no problem finding Criticals. It's Alex Chapman and I spoke with him in the recent episode of the podcast to...
Looking back at the past 4 months
Eldar describes his experiences with different bug bounty platforms and specifically their triage process. He definitely makes me want to spend some time on YesWeHack and Intigiriti because he wrote that the triage process is smoother than on Hackerone or Bugcrowd....
Don’t Force Yourself to Become a Bug Bounty Hunter
Sam Curry, one of the best hunters out there, wrote a blogpost about the topic of motivation in bug bounty. I think it’s always valuable to see words like this from someone like him because it can be puzzling of why even the best hunters out there don’t do it...
Bug bounty stats for the first 8 months
Shreyas Chavhan shared his exact roadmap for the first 8 months in bug bounty. I am a huge fan of initiatives like this that show us the real image, with the amount of time invested and not just the best parts. One of the things we can see here is the power of...
Attacking internal hosts for bug bounty
This is a very fun thing that Truffle Security has done! We all know many servers have misconfigured CORS, including internal websites. The problem with them is that from outside, we can’t reach them so so how do we exploit them? Truffle Security decided to purchase a...
Forging signed commits on GitHub
I find reports like this one very satisfying. In short, in GitHub’s commit signing flow, there were two different components and one of them extracted the email of the author regardless of whether there was a username while the regex in another component only accepted...
CTTB – The OG Bug Bounty King – Frans Rosen
If you are not listening to the Critical Thinking Bug Bounty Podcast, you are missing out on tons of useful, intermediate to advanced bug bounty and web security tips. I do listen to every single episode. Recently, I played the one with Frans Rosen and, at times, it...
4 DOs and DON’Ts for writing quality reports
None of us manual hackers has an infinite number of bugs to report. Sometimes, we need a few hours to find a bug but at other times, we need days or weeks. So when we finally have it, it would be stupid to write a poor report and get a bounty lower than we deserve....