Saturday, January 20, 2024

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

More information

Aircrack-ng: The Next Generation Of Aircrack


"Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks." read more...

Website: http://www.aircrack-ng.org

Read more

What Is Cybercrime? What Are The Types Of Cybercrime? What Is Cyberlaw In India?

What is cyber crime?

Cybercrime is the use of computers & networks to perform illegal activities such as spreading viruses,online  bullying,performing unauthorized electronic fund transfers etc. Most cyber crimes are committed through the internet.
Some cyber crime also be carried out using mobile phones via Sms and online chatting applications.

TYPES OF CYBERCRIME

The following list presents the common types of cybercrimes-

1-Computer Fraud-Intential deception for personal gain via the use of computer system.

2-Privacy Violations-Exposing personal information such as email addresses,phone numbers,account details etc, on social media,websites,etc.

3-Identity theft-Stealing personal information from somebody and impersonating that person.

4-Sharing copyright files/information-This involves distributing copyright protected files such as eBooks and computer program etc.

5-Electronic funds transfer-This involves gaining an unauthorized access to bank computer networks and making illegal funds transferring.

6-Electronic money laundering-This involves the use of the computer to launder money.

7-Atm fraud-This involves intercepting ATM card details such as account numbers and PIN numbers.These details are then used to withdraw funds from the intercepted accounts.

8-Denial of service attack-This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

9-Spam:sending unauthorized emails.
These emails usually contain advertisements.


CYBER LAW

Under The Information Technology Act,2000 
CHAPTER XI-OFFENCES-66. Hacking with computer system.

1-whoever with the Intent to cause or knowing that he is likely to cause Wrongfull Loss or Damage to the public or any person Destroys or Deletes or Alter any Information Residing in computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

2-whoever commits hacking shell be punished with imprisonment up to three years, or  with fine which may extend up to two lakh rupees,or with both.

More information


Friday, January 19, 2024

WHO IS ETHICAL HACKER

Who is hacker?
A hacker is a Creative person and a creative Programmer,who have knowledge about Networking,Operating system,hacking & a best creative social engineer who control anyone's mind he is also a knowledgeable person.
Hacker are the problem solver and tool builder.

                                OR

A hacker is an individual who uses computer, networking and other skills to overcome a technical problem but it often refers to a person who uses his or her abilities to gain unauthorized access to system or networks in  order to commit crimes. 


More articles
  1. What Are Hacking Tools
  2. Hacks And Tools
  3. Hacker Tools For Ios
  4. Computer Hacker
  5. Pentest Tools Kali Linux
  6. Hacking Tools And Software
  7. Hacker Tool Kit
  8. Hacker Tools For Mac
  9. How To Install Pentest Tools In Ubuntu
  10. Hacking Tools For Windows
  11. Kik Hack Tools
  12. Hacking Tools Mac
  13. World No 1 Hacker Software
  14. Pentest Tools Android
  15. Hack Tools Github
  16. Pentest Reporting Tools
  17. Pentest Tools Download
  18. Termux Hacking Tools 2019
  19. Pentest Tools Kali Linux
  20. Hack Tools For Mac
  21. Pentest Tools Url Fuzzer
  22. Hacking Tools
  23. Hacker Tools Hardware
  24. Pentest Tools Windows
  25. Hacker Tools For Windows
  26. Pentest Tools For Ubuntu
  27. Hacking Tools Usb
  28. Pentest Tools For Ubuntu
  29. Pentest Tools Website Vulnerability
  30. Hack Tool Apk No Root
  31. Pentest Tools Bluekeep
  32. Top Pentest Tools
  33. Hack Apps
  34. Hacking Tools Mac
  35. Hacking Tools And Software
  36. Pentest Tools Windows
  37. Hack Tools For Games
  38. Pentest Tools Github
  39. Termux Hacking Tools 2019
  40. Ethical Hacker Tools
  41. Hack Tools For Mac
  42. Best Hacking Tools 2019
  43. Hacking Tools Github
  44. Blackhat Hacker Tools
  45. Hacker Tools Free
  46. Pentest Tools Online
  47. Tools 4 Hack
  48. Pentest Tools Tcp Port Scanner
  49. Hacker Tools Hardware
  50. Hack Tools For Pc
  51. Pentest Tools Online
  52. Black Hat Hacker Tools
  53. Hacking Tools Online
  54. Hackrf Tools
  55. Hacking Tools And Software
  56. Pentest Tools For Windows
  57. Pentest Tools For Ubuntu
  58. Pentest Automation Tools
  59. Hacker Tools Apk Download
  60. Pentest Tools Online
  61. Pentest Tools List
  62. Hacker Tools Mac
  63. Hack App
  64. Ethical Hacker Tools
  65. Best Hacking Tools 2020
  66. Hacking Tools Github
  67. Growth Hacker Tools
  68. Hack Tools Mac
  69. Github Hacking Tools
  70. Wifi Hacker Tools For Windows
  71. Android Hack Tools Github
  72. Hacker Tools Hardware
  73. Hacker
  74. Best Hacking Tools 2020
  75. New Hacker Tools
  76. Hack Tools For Mac
  77. Hacker
  78. Termux Hacking Tools 2019
  79. Hacker Tools Free Download
  80. Tools For Hacker
  81. Hacking Tools For Kali Linux
  82. Hacker Tools Windows
  83. Hacking Tools Download
  84. New Hack Tools
  85. Pentest Tools Tcp Port Scanner
  86. Wifi Hacker Tools For Windows
  87. Hacking Tools And Software
  88. Best Hacking Tools 2020
  89. What Are Hacking Tools
  90. Hacking Tools Name
  91. Android Hack Tools Github
  92. Hack Tools Mac
  93. Hak5 Tools
  94. Hacker Security Tools
  95. Hacking Tools
  96. Hacking Tools Free Download
  97. Hacker Tools
  98. Hacker Tools Linux
  99. Pentest Tools Port Scanner
  100. Tools For Hacker
  101. Usb Pentest Tools
  102. Hacking Tools For Beginners
  103. Hacker Hardware Tools
  104. Hacker Tools For Ios
  105. How To Hack
  106. Hack Tool Apk No Root
  107. Pentest Tools Windows
  108. Nsa Hacker Tools
  109. Hacker Tools Github
  110. Beginner Hacker Tools
  111. Hacker Hardware Tools
  112. Underground Hacker Sites
  113. Hacking Tools Github
  114. How To Install Pentest Tools In Ubuntu
  115. Usb Pentest Tools
  116. Pentest Tools Bluekeep
  117. Pentest Tools Apk
  118. Tools Used For Hacking
  119. Hacker Tools Linux
  120. Blackhat Hacker Tools
  121. World No 1 Hacker Software
  122. Hack Tools For Windows
  123. Pentest Tools Free
  124. Game Hacking
  125. Hack Tools For Pc
  126. How To Hack
  127. New Hacker Tools
  128. Pentest Tools Online
  129. Free Pentest Tools For Windows
  130. Black Hat Hacker Tools
  131. Pentest Tools For Mac
  132. Tools For Hacker
  133. Pentest Tools
  134. Best Hacking Tools 2020
  135. Pentest Tools Kali Linux
  136. Github Hacking Tools
  137. Hacker Tools 2020
  138. Hack Tools Mac
  139. Termux Hacking Tools 2019
  140. Pentest Tools Tcp Port Scanner
  141. Hacker Tools
  142. Physical Pentest Tools
  143. Hack Tools Download
  144. Growth Hacker Tools
  145. Hack Tools
  146. Pentest Tools Nmap
  147. Hak5 Tools
  148. Pentest Tools Linux
  149. Hacks And Tools
  150. Hacker Tool Kit
  151. Hacking Tools Github
  152. Pentest Tools Free
  153. Pentest Tools Apk
  154. Hacking App
  155. Hacking Tools Pc
  156. New Hack Tools
  157. Hacking Tools Hardware
  158. Hack Tools Github
  159. Hack Tool Apk
  160. Pentest Tools Github
  161. Hackers Toolbox
  162. Hack Tools For Pc
  163. Hacker Tools List
  164. New Hack Tools
  165. How To Install Pentest Tools In Ubuntu
  166. How To Make Hacking Tools
  167. Hacker Tool Kit
  168. Hacking Tools Download