Главная
Study mode:
on
1
Intro
2
Who am I
3
Why bug bounty hunting
4
Regular job vs bug bounty
5
My stats
6
My recycling
7
Defining scope
8
Research
9
Time
10
Scope
11
Overview
12
How to get started
13
My scope
14
Subdomain search
15
Autoscope
16
Nmap
17
Hashtags
18
Wrong incomplete
19
Resetting
20
Axiom
21
Search for Axiom
22
What is Axiom
23
How it works
24
Benefits
25
File
26
Nuclear
27
How to run
28
How powerful is it
29
Running a scan
30
Results
31
Proof of concept
32
Reporting
33
Score
34
Tooling
35
Other tools
36
QA
Description:
Discover the essentials of bug bounty hunting in this 36-minute conference talk from DefCamp 2021. Learn about the differences between regular jobs and bug bounty hunting, explore effective strategies for defining scope, and gain insights into research techniques. Delve into subdomain searching, autoscoping, and the use of tools like Nmap and Axiom. Understand the process of running scans, analyzing results, and creating proof of concepts. Get valuable tips on reporting findings, scoring, and essential tooling for successful bug bounty hunting. Perfect for beginners looking to enter the field of cybersecurity and information security.

Recipe for a Beginner in Bug Bounty Hunting - DefCamp - 2021

DefCamp
Add to list