0% found this document useful (0 votes)
744 views3 pages

Bug Bounty Roadmap

The document provides a roadmap for bug bounty hunting including recommended browsers, packet capturing tools, subdomain finders, screenshot tools, bug bounty platforms, practice platforms, OWASP Top 10 vulnerabilities to target, common cheat sheets, and penetration testing methodologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
744 views3 pages

Bug Bounty Roadmap

The document provides a roadmap for bug bounty hunting including recommended browsers, packet capturing tools, subdomain finders, screenshot tools, bug bounty platforms, practice platforms, OWASP Top 10 vulnerabilities to target, common cheat sheets, and penetration testing methodologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

BUG BOUNTY ROADMAP

 Browsers –

o Chrome

o Firefox

 Packet Capturing –

o Burp Suite

o ZAP Proxy

 Sub Domain Finder –

o Sublist3r

o Subfinder

o Assetfinder

 Screenshot –

o EyeWitness

 Bug Bounty Platforms –

o HackerOne

o Bugcrowd

o Intigriti

o HackenProof

o SynAck

o YesWeHack
 Practice Platforms –

o BWapp

o DVWA

o OWASP Webgoat

o Cyclone Transfers

o Bricks

o Butterfly Security Project

o Hackme

o Juice Shop

o Rails Goat

o SQLol

 Owasp Top 10 –

o A01:2021 – Broken Access Control

o A02:2021 – Cryptographic Failures

o A03:2021 – Injection

o A04:2021 – Insecure Design

o A05:2021 – Security Misconfigurations

o A06:2021 – Vulnerable and Outdated Components

o A07:2021 – Identification and Authentication Failures


o A08:2021 – Software and Data Integrity Failures

o A09:2021 – Security Logging and Monitoring Failures

o A10:2021 – Server-Side Request Forgery

 Cheat Sheet –

o SQL Injection Cheat-Sheet

o XSS Cheat-Sheet
o XXE Payload

 Pen Testing Methodologies

o Penetration Testing Framework


o The Penetration Testing Execution Standard
o The WASC Threat Classification
o OWASP Top Ten Project
o The Social Engineering Framework

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy