InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

BugBounty — Mastering the Basics (along with Resources)[Part-1]

Abhinav Pathak
InfoSec Write-ups
Published in
7 min readOct 26, 2024
Bug Bounty Programs

Mastering the Basics!

Before starting your bug bounty journey, it’s essential to establish a solid grasp of the foundational elements that underpin the world of cybersecurity. This section lays the groundwork for your exploration, ensuring you have the necessary knowledge to navigate the intricate web of networks, systems, and programming languages.

A firm grasp of the fundamental building blocks is crucial to engage in bug bounty hunting and ethical hacking effectively. Begin your journey by acquainting yourself with the following key concepts:

Understanding Network, Web, and Communication Basics (Along with Resources)

Computer Fundamentals:

Network Basics:

Acquire a basic understanding of networking principles, an essential knowledge for anyone delving into the realm of computers. Explore resources such as

Web:

For an overview of the web, you should give a read to any two of these. These will not only refresh your web basic fundamentals but also prepare you for what’s coming ahead.

Communication Protocols:
To learn something, you must learn how it works and how data is exchanged within or between computers. How an application works and what its flow is we need to learn how it communicates with you. For that purpose, you must go through the following list to understand Network Protocols and their uses.

Database:
You must learn about Database basics and understand it as this is one of the crucial parts of what you’ll gonna be attacking as a hacker in many cases.

Choose an Operating System:

According to Eric Steven Raymond, “The single most important step any newbie can take toward acquiring hacker skills is to get a copy of Linux or one of the BSD-Unixes, install it on a personal machine, and run it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast.“

Whichever OS you choose, ensure to familiarize yourself with essential commands through cheat sheets like this below:

Windows:

Coding Proficiency: The Path to Mastery:

While becoming a proficient programmer might not be mandatory, having a solid understanding of programming languages is undeniably beneficial in the realm of bug bounty hunting.

You will suffer in bug bounties if you cannot understand what the particular code means, can’t exploit an issue properly, or can’t even code in general.

Strengthen your coding skills with the following languages:

HTML:

PHP:

JavaScript:

SQL (Structured Query Language):

Java:

C/C++

What You’ll learn from these is not just Programming languages but the proper way of web and systems to communicate that you gonna test or build. I’m also a student in Programming so sharing the resources I’m currently following.

Embrace Automation:

“Never send a human to do a machine’s job”

To truly excel in the world of bug bounty hunting, mastering automation is essential. Automation empowers you to work faster, more efficiently, and continuously while reducing repetitive tasks.

Have a look at the slides below and read an awesome article on

Strengthen your automation capabilities with these languages, If you can grasp hold on to one or more of the following languages you can easily & very happily automate your work and earn in a better way.

Python:

Bash:

Golang:

Ruby:

By mastering these foundational components, you’ll empower yourself to code tools, understand various software aspects, and embrace the world of automation. Remember, this is your bedrock for growth — refine your skills, practice consistently, and lay the groundwork for your bug bounty journey.

Any type of comments are welcome. Thank you for your time :)).

Happy Hacking !!!

If you enjoyed reading the article do clap and follow:

Twitter: https://twitter.com/i_amsphinx

LinkedIn: https://www.linkedin.com/in/pathakabhi24/

GitHub: https://github.com/pathakabhi24

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Responses (2)

Write a response