Bug Hunter Handbook
  • Introduction
  • Getting Started in InfoSec and Bug Bounties.
  • Presentations
  • Checklists / Guides
  • Useful Twitter Threads
  • List of Vulnerabilities
    • Recon and OSINT
      • Recon
      • Sensitive information using Github
      • Subdomain Enumeration
        • Resolvers
      • Javascript Enumeration
      • After Recon
      • Finding Information Using Public Resources
      • OSINT
      • Cloud
      • Wayback
      • Parameter / Content Discovery
      • Broken Link Highjacking
    • Host Header
    • Injection
      • Other Injection
    • DNS Rebinding
    • Cross Site Scripting (XSS)
      • Weaponizing XSS
      • WAF Bypass
    • Cross Origin Resource Sharing (CORS)
    • Local / Remote File Inclusion (LFI / RFI)
    • Server Side Request Forgery (SSRF)
    • Remote Code Execution (RCE)
    • XML Entity Injecton (XXE)
    • Price Manipulation
    • Directory / Path Traversal
    • Cross Site Request Forgery (CSRF)
      • JSON CSRF
    • Password Reset
    • Login Page Issues
    • Deserialization Attacks
    • File Upload
    • Account Takeover
    • Insecure Direct Object References (IDOR)
    • Open Redirect
    • Business Logic Flaws
    • Rate Limit Bypass / 2FA / OTP Bypass
    • Ruby on Rails
      • Mass Assginment
    • S3 Bucket
    • Race Condition
    • CRLF
    • SSTI
    • Prototype Pollution
  • Approach
  • API Security
  • Mobile Security
  • Fuzzing / Wordlists
  • BugBounty Short Write-ups
  • Burp Suite Tips and Tricks
  • HackerOne Reports
  • Response Manipulation
  • Client Vs Server Side Vulnerabilities
  • DevSecOps
  • Containers
    • Docker
    • Kubernetes
    • Containers
  • AWS
  • Azure
  • Others
    • Code Review
    • Web Sockets
    • Web Cache
    • HTTP Desync Attacks
    • Zone Transfer
    • CSP Bypass
    • Payment Bypasses
    • Http Parameter Pollution
    • Postmessage
    • Others
    • GraphQL
    • Unix / Linux
    • Email Related
    • Dependency confusion
    • Nginx Misconfigs
    • JIRA
    • OAUTH
  • Chaining of Bugs
  • Bug Bounty Automation
  • Mindmaps
  • Oneliner Collections
  • Red Teaming
  • Blue Teamining
  • Recon One Liners
  • Misc
  • Wordpress
  • Fuzzing / FuFF
  • OWASP ZAP
  • Bug List
  • Setting up burp collaborator
  • Admin Panel PwN
  • Credential Stuffing / Dump / HaveibeenPwned?
  • Tools Required
  • Nuclei Template
  • Other BugBounty Repos / Tips
  • Interview
  • Threat Modelling
  • AppSec
Powered by GitBook
On this page

Was this helpful?

Approach

PreviousPrototype PollutionNextAPI Security

Last updated 6 months ago

Was this helpful?

  • Recon

  • Sub Domain

  • Public Exploits

  • Assest Discovery

  • Google Search

  • Censys

    • censys.io

      • Look for SSL certificates

        • 443.https.tls.certificate.parsed.extensions.subject_alt_name.dns_name:bugcrowd.com

      • Look for Internal certificates

        • "COMPANY" + internal (get creative) => might allow you to find a company internal subdomain or IP address not mentioned anywhere

  • Shodan

  • Web Archive

  • Sensitive info from public resources - github, gist, pastebin , Trello , google sites , google groups , prezi , scribd , slideshare , online IDE's , github wiki , Graffana , zookeeper

  • Trello -

  • OSINT -

  • Javascript Recon / Client Side Recon

  • Reverse DNS / Whois

  • Virtual Host

  • Retrive HTTP Status -

  • Broken link hijacking

  • Reffere Header Check

  • Rate Limiting

  • BFAC - BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code. -

  • Bruteforce GET / POST methods

  • Vhost bruteforcing

  • vhost 0

  • vhost -

  • content discovery - For Content Discovery : , , , httpx, Subfinder,

  • urlscan.io Get directory and files from public scans for fun & profit url(){ gron "" | grep 'url' | gron --ungron } .bash_profile Make sure you have gron installed​

https://www.freecodecamp.org/news/discovering-the-hidden-mine-of-credentials-and-sensitive-information-8e5ccfef2724/
https://twitter.com/imhaxormad/status/1118289299152072706
https://twitter.com/payloadartist/status/1066641639534297088
https://twitter.com/HusseiN98D/status/1158503813399142401
https://twitter.com/HusseiN98D/status/1159912979695116293
https://github.com/mazen160/bfac
https://twitter.com/nnwakelam/status/1114122122534641664
https://twitter.com/rez0__/status/1254588390114287617
Use ffuf for vhosting on every new domain to find hidden servers/admin panels: ffuf -c -u https://target .com -H “Host: FUZZ” -w vhost_wordlist.txt #BugBountyTips #BugBountyTip #BugBounty
gau
Paramspider
Waybackurl
sublist3r,
@urlscanio
https://urlscan.io/api/v1/search/?q=domain:$1…
$source
$url
http://target.com
@TomNomNom