- Hack And Tools
- Hacking Tools 2020
- Pentest Box Tools Download
- Pentest Tools List
- Nsa Hack Tools
- Hacker Tools Apk
- Hacking Tools Name
- Hack And Tools
- Hack Tools For Ubuntu
- Tools For Hacker
- Hacker Tools Software
- Pentest Tools For Android
- What Are Hacking Tools
- Pentest Tools Online
- Easy Hack Tools
- Hacking Tools For Beginners
- Pentest Tools Open Source
- Pentest Tools Windows
- Hacker Tools Mac
- Hackers Toolbox
- Best Hacking Tools 2019
- Pentest Tools For Mac
- Hacker Tools Apk Download
- Kik Hack Tools
- Hacker Tools Hardware
- Pentest Tools Subdomain
- New Hack Tools
- Kik Hack Tools
- Hack Tool Apk
- Pentest Tools Url Fuzzer
- Hack Rom Tools
- Hacking Tools And Software
- Hacker Tools Windows
- Hack Tool Apk
- Hacking Tools For Windows
- Black Hat Hacker Tools
- Hacking Tools For Mac
- What Are Hacking Tools
- Nsa Hack Tools
- Pentest Tools Url Fuzzer
- Hack Tools Online
- Hacking Tools Mac
- Pentest Tools Website Vulnerability
- Hacking Tools Windows
- Hacking Tools 2019
- Hacker Tools Windows
- Hacking Tools Software
- Hack App
- Hacking Tools Name
- Tools Used For Hacking
- Pentest Tools
- Hacker Security Tools
- Install Pentest Tools Ubuntu
- Pentest Tools List
- New Hacker Tools
- Pentest Box Tools Download
- Hacks And Tools
- Hack Tools Online
- Pentest Tools List
- Hacker Tools Hardware
- Hacking Tools 2020
- What Is Hacking Tools
- Nsa Hack Tools Download
- Hack Tools
- Pentest Tools Alternative
- Hacker Security Tools
- Best Pentesting Tools 2018
- Hacker Tools List
- Pentest Tools Free
- Hacking Tools Free Download
- Pentest Tools Alternative
- How To Make Hacking Tools
- Pentest Tools For Mac
- How To Make Hacking Tools
- Hacker Techniques Tools And Incident Handling
- Kik Hack Tools
- Growth Hacker Tools
- Hacker Hardware Tools
- Tools Used For Hacking
- Hacker Tools Mac
- Hack Tool Apk
- Hacking Tools Online
- Pentest Recon Tools
- Hack Tools
lunes, 5 de junio de 2023
Hackerhubb.blogspot.com
Hackerhubb.blogspot.comMore articles
Attacking Financial Malware Botnet Panels - SpyEye
This is the second blog post in the "Attacking financial malware botnet panels" series. After playing with Zeus, my attention turned to another old (and dead) botnet, SpyEye. From an ITSEC perspective, SpyEye shares a lot of vulnerabilities with Zeus.
The following report is based on SpyEye 1.3.45, which is old, and if we are lucky, the whole SpyEye branch will be dead soon.
Google dorks to find SpyEye C&C server panel related stuff:
- if the img directory gets indexed, it is rather easy, search for e.g. inurl:b-ftpbackconnect.png
- if the install directory gets indexed, again, easy, search for e.g. inurl:spylogo.png
- also, if you find a login screen, check the css file (style.css), and you see #frm_viewlogs, #frm_stat, #frm_botsmon_country, #frm_botstat, #frm_gtaskloader and stuff like that, you can be sure you found it
- otherwise, it is the best not to Google for it, but get a SpyEye sample and analyze it
The best part is that you don't have to guess the admin's username ;)
This is how an average control panel looks like:
Hack the Planet! :)
Boring vulns found (warning, an almost exact copy from the Zeus blog post)
- Clear text HTTP login - you can sniff the login password via MiTM, or steal the session cookies
- No password policy - admins can set up really weak passwords
- No anti brute-force - you can try to guess the admin's password. There is no default username, as there is no username handling!
- Password autocomplete enabled - boring
- Missing HttpOnly flag on session cookie - interesting when combining with XSS
- No CSRF protection - e.g. you can upload new exe, bin files, turn plugins on/off :-( boring. Also the file extension check can be bypassed, but the files are stored in the database, so no PHP shell this time. If you check the following code, you can see that even the file extension and type is checked, and an error is shown, but the upload process continues. And even if the error would stop the upload process, the check can be fooled by setting an invalid $uptype. Well done ...
if ($_FILES['file']['tmp_name'] && ($_FILES['file']['size'] > 0)) { $outstr = "<br>"; set_time_limit(0); $filename = str_replace(" ","_",$_FILES['file']['name']); $ext = substr($filename, strrpos($filename, '.')+1); if( $ext==='bin' && $uptype!=='config' ) $outstr .= "<font class='error'>Bad CONFIG extension!</font><br>"; if( $ext==='exe' && $uptype!=='body' && $uptype!=='exe' ) $outstr .= "<font class='error'>Bad extension!</font><br>"; switch( $uptype ) { case 'body': $ext = 'b'; break; case 'config': $ext = 'c'; break; case 'exe': $ext = 'e'; break; default: $ext = 'e'; } $_SESSION['file_ext'] = $ext; if( isset($_POST['bots']) && trim($_POST['bots']) !== '') { $bots = explode(' ', trim($_POST['bots'])); //writelog("debug.log", trim($_POST['bots'])); $filename .= "_".(LastFileId()+1); } if( FileExist($filename) ) $filename .= LastFileId(); $tmpName = $_FILES['file']['tmp_name']; $fileSize = $_FILES['file']['size']; $fileType = $_FILES['file']['type']; ## reading all file for calculating hash $fp = fopen($tmpName, 'r'); - Clear text password storage - the MySQL passwords are stored in php files, in clear text. Also, the login password to the form panel is stored in clear text.
- MD5 password - the passwords stored in MySQL are MD5 passwords. No PBKDF2, bcrypt, scrypt, salt, whatever. MD5. Just look at the pure simplicity of the login check, great work!
$query = "SELECT * FROM users_t WHERE uPswd='".md5($pswd)."'";
- ClickJacking - really boring stuff
SQL injection
SpyEye has a fancy history of SQL injections. See details here, here, here, video here and video here.
It is important to highlight the fact that most of the vulnerable functions are reachable without any authentication, because these PHP files lack user authentication at the beginning of the files.
It is important to highlight the fact that most of the vulnerable functions are reachable without any authentication, because these PHP files lack user authentication at the beginning of the files.
But if a C&C server owner gets pwned through this vuln, it is not a good idea to complain to the developer, because after careful reading of the install guide, one can see:
"For searching info in the collector database there is a PHP interface as formgrabber admin panel. The admin panel is not intended to be found on the server. This is a client application."
And there are plenty of reasons not to install the formgrabber admin panel on any internet reachable server. But this fact leads to another possible vulnerability. The user for this control panel is allowed to remotely login to the MySQL database, and the install guide has pretty good passwords to be reused. I mean it looks pretty secure, there is no reason not to use that.
Next time you find a SpyEye panel, and you can connect to the MySQL database, it is worth a shot to try this password.
Unfortunately the default permissions for this user is not enough to write files (select into outfile):
CREATE USER 'frmcpviewer' IDENTIFIED BY 'SgFGSADGFJSDGKFy2763272qffffHDSJ';
Next time you find a SpyEye panel, and you can connect to the MySQL database, it is worth a shot to try this password.
Unfortunately the default permissions for this user is not enough to write files (select into outfile):
Access denied for user 'frmcpviewer' (using password: YES)
I also made a little experiment with this SQL injection vulnerability. I did set up a live SpyEye botnet panel, created the malware install binaries (droppers), and sent the droppers to the AV companies. And after more and more sandboxes connected to my box, someone started to exploit the SQL injection vulnerability on my server!
63.217.168.90 - - [16/Jun/2014:04:43:00 -0500] "GET /form/frm_boa-grabber_sub.php?bot_guid=&lm=3&dt=%20where%201=2%20union%20select%20@a:=1%20from%20rep1%20where%20@a%20is%20null%20union%20select%20@a:=%20@a%20%2b1%20union%20select%20concat(id,char(1,3,3,7),bot_guid,char(1,3,3,7),process_name,char(1,3,3,7),hooked_func,char(1,3,3,7),url,char(1,3,3,7),func_data)%20from%20rep2_20140610%20where%20@a=3%23 HTTP/1.1" 200 508 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E)"
Although the query did not return any meaningful data to the attacker (only data collected from sandboxes), it raises some legal questions.
Which company/organization has the right to attack my server?
- police (having a warrant)
- military (if we are at war)
- spy agencies (always/never, choose your favorite answer)
- CERT organisations?
But, does an AV company or security research company has the legal right to attack my server? I don't think so... The most problematic part is when they hack a server (without authorization), and sell the stolen information in the name of "intelligence service". What is it, the wild wild west?
The SQLi clearly targets the content of the stolen login credentials. If this is not an AV company, but an attacker, how did they got the SpyEye dropper? If this is an AV company, why are they stealing the stolen credentials? Will they notify the internet banking owners about the stolen credentials for free? Or will they do this for money?
And don't get me wrong, I don't want to protect the criminals, but this is clearly a grey area in the law. From an ethical point of view, I agree with hacking the criminal's servers. As you can see, the whole post is about disclosing vulns in these botnet panels. But from a legal point of view, this is something tricky ... I'm really interested in the opinion of others, so comments are warmly welcome.
On a side note, I was interested how did the "attackers" found the SpyEye form directory? Easy, they brute-forced it, with a wordlist having ~43.000 entries.
(Useless) Cross site scripting
Session handling
Binary server
Log files revealed
Reading the code
$content = fread($fp, filesize($tmpName)); if ( $uptype === 'config' ) $md5 = GetCRC32($content); else $md5 = md5($content); .... <script> if (navigator.userAgent.indexOf("Mozilla/4.0") != -1) { alert("Your browser is not support yet. Please, use another (FireFox, Opera, Safari)"); document.getElementById("div_main").innerHTML = "<font class=\'error\'>ChAnGE YOuR BRoWsEr! Dont use BUGGED Microsoft products!</font>"; } </script> Decrypting SpyEye communication
It turned out that the communication between the malware and C&C server is not very sophisticated (Zeus does a better job at it, because the RC4 key stream is generated from the botnet password).
function DeCode($content) { $res = ''; for($i = 0; $i < strlen($content); $i++) { $num = ord($content[$i]); if( $num != 219) $res .= chr($num^219); } return $res; } This means that it is easy to create a script, which can communicate with the SpyEye server. For example this can be used to fill in the SpyEye database with crap data.
import binascii import requests import httplib, urllib def xor_str(a, b): i = 0 xorred = '' for i in range(len(a)): xorred += chr(ord(a[i])^b) return xorred b64_data= "vK6yv+bt9er17O3r6vqPnoiPjZb2i5j6muvo6+rjmJ/9rb6p5urr6O/j/bK+5uP16/Xs7evq9ers7urv/bSo5u316vXs7evq/a6v5pq/trK1/bi4qbjm453j6uPv7Or9tr/u5um+uuvpve3p7eq/4+vsveLi7Lnqvrjr6ujs7rjt7rns/au3vOa5sre3srW8s7q2tr6p4Lm3tLiw4LmuvKm+q7Spr+C4uPu8qbq5ub6p4Li4vKm6ubm+qeC4qb6/sq+8qbq54LiuqK+0tri0tbW+uK+0qeC/v7So4L+1qLqrsuC+trqyt7ypurm5vqngvb24vqmvvKm6ubm+qeC9/aivuq/mtLW3srW+" payload =xor_str (binascii.a2b_base64(b64_data), 219) print ("the decrypted payload is: " + payload) params = (binascii.b2a_base64(xor_str(payload,219))) payload = {'data': params} r = requests.post("http://spyeye.localhost/spyeye/_cg/gate.php", data=payload) Morale of the story?
- Hack Tools Online
- Hacking Apps
- Top Pentest Tools
- Hacking Tools Download
- How To Make Hacking Tools
- Pentest Tools Find Subdomains
- Hacking Tools Mac
- Hack Tools For Games
- Computer Hacker
- Hacker Tools Windows
- Tools For Hacker
- Pentest Tools Windows
- Ethical Hacker Tools
- How To Hack
- Hacker Tools Free
- Best Hacking Tools 2020
- Pentest Tools
- Hacker Tools Github
- How To Hack
- Pentest Tools Online
- Hack Tools Pc
- Hacking Tools For Pc
- Pentest Tools Android
- Hacker Tools For Windows
- Hacker Security Tools
- Hack App
- Best Pentesting Tools 2018
- Hacker Hardware Tools
- Pentest Tools Online
- Best Pentesting Tools 2018
- What Is Hacking Tools
- Pentest Tools List
- Hack Tools Download
- Usb Pentest Tools
- Hacking Tools For Kali Linux
- Hacking Tools For Windows Free Download
- Blackhat Hacker Tools
- Hacking Tools Pc
- Hacking Tools Software
- Hack Tool Apk
- Hacker Tool Kit
- Best Hacking Tools 2020
- Hacker Hardware Tools
- Hacker Tools For Mac
- Best Hacking Tools 2019
- Hacker Tools Apk
- Hack Tools For Mac
- Nsa Hacker Tools
- Bluetooth Hacking Tools Kali
- Best Hacking Tools 2019
- Hacking Tools For Beginners
- Hack Apps
- Pentest Tools Url Fuzzer
- Pentest Tools Online
- Usb Pentest Tools
- Hack Tools Download
- Wifi Hacker Tools For Windows
- Hacking App
- Hacking Tools Usb
- Computer Hacker
- Install Pentest Tools Ubuntu
- Hacking Tools Windows 10
- Hacking Tools And Software
- Hacker Tools Apk
- Hacker Tools Mac
- Hacker Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Computer Hacker
- Pentest Tools Framework
- Hack Tools Mac
- Pentest Tools For Ubuntu
2020-12-13 SUNBURST SolarWinds Backdoor Samples
2020-12-13 Fireeye
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
Download (627.7 MB). Email me if you need the password (see in my profile)Reference
I am sure you all saw the news.
The Resurgence of Russian Threat Actor, NOBELIUM
Well, here are the Sunburst binaries.
Here is a Sunburst malware analysis walk-through video by Colin Hardy
Hashes
SolarWinds.Orion.Core.BusinessLayer.dll
Trojan:MSIL/Solorigate.B!dha
A Variant Of MSIL/SunBurst.A
SolarWinds.Orion.Core.BusinessLayer.dll
32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77
dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b
eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed
c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77
ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c
019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134
ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6
a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc
d3c6785e18fba3749fb785bc313cf8346182f532c59172b69adfb31b96a5d0af
0f5d7e6dfdd62c83eb096ba193b5ae394001bac036745495674156ead6557589
6e4050c6a2d2e5e49606d96dd2922da480f2e0c70082cc7e54449a7dc0d20f8d
CORE-2019.4.5220.20574-SolarWinds-Core-v2019.4.5220-Hotfix5.msp
d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600
appweblogoimagehandler.ashx.b6031896.dll
c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71
TEARDROP
b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07
1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c
RAINDROP
be9dbbec6937dfe0a652c0603d4972ba354e83c06b8397d6555fd1847da36725
This is the compromised installer file ( was still on Solarwinds update downloads on Dec 14, 2020)
File size 419.76 MB
CoreInstaller.msi
ad2fbf4add71f61173975989d1a18395afb8538ed889012b9d2e21c19e98bbd1
2020-04-21 17:31:02
SolarWinds Orion Core Services 2020.2
{77E2D294-3D5C-4D93-ADF1-884CCEAD93B0}
File Version Information
Date signed 05:32 PM 04/21/2020
Signers
Solarwinds Worldwide, LLC
Symantec Class 3 SHA256 Code Signing CA
VeriSign
VT - 0 (Dec 14, 2020)
If you unzip, check
019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134 (36 detections , part of the IOC set)
SolarWinds.Orion.Core.BusinessLayer.dll under OrionCore
Related news
- Pentest Tools For Windows
- Physical Pentest Tools
- Hacker Tools Apk Download
- Hacking Tools Software
- Hacking Tools For Games
- Hacker Tools Apk Download
- Pentest Tools Framework
- Hack And Tools
- Hack Tool Apk No Root
- Hacker Tools Windows
- Hak5 Tools
- Pentest Tools For Ubuntu
- Hacking Tools Online
- Hack Tools
- Hacker Tool Kit
- Hacking Tools
- Hacking Tools 2020
- Hacking Tools Windows 10
- Hacker Tools Apk
- Hacker Tools For Mac
- Hacking Tools Hardware
- World No 1 Hacker Software
- Pentest Tools Website
- Hacking Tools Usb
- Hacker Tools Github
- Hacking Tools Free Download
- Hacker Tools Online
- Hack Tools 2019
- Hacking Tools Online
- Hacking Tools Usb
- Pentest Tools Review
- Hacking Tools For Pc
- Hacker Tools Free Download
- Hacking Tools For Kali Linux
- Pentest Tools Apk
- Hacking Tools Download
- Hack Tools Github
- Underground Hacker Sites
- Hack Tools For Windows
- Hacker Tools 2019
- Hacking Tools Free Download
- Hacker Tools Windows
- Pentest Tools For Mac
- Hacking Tools Name
- Nsa Hack Tools Download
- Hack Rom Tools
- Pentest Tools Kali Linux
- Hacking Tools Hardware
- Beginner Hacker Tools
- What Are Hacking Tools
- Pentest Automation Tools
- Top Pentest Tools
- Hack Tools Download
- Hacking Tools Github
- Pentest Tools For Ubuntu
- Hack Tool Apk No Root
- Hacking Tools Kit
- Pentest Tools For Android
- Hack Tools For Mac
- Blackhat Hacker Tools
- Termux Hacking Tools 2019
- Pentest Tools For Windows
- Pentest Tools For Mac
- Hack Tools For Ubuntu
- Hacking Tools For Games
- Pentest Tools
- Pentest Tools Alternative
- Physical Pentest Tools
- Hacker Tools Windows
- Tools Used For Hacking
- Underground Hacker Sites
- Hacking Tools Software
- Hacking Tools For Windows 7
- Hacking Tools Software
- World No 1 Hacker Software
- Blackhat Hacker Tools
- Pentest Tools List
- Hacker Tools Free Download
- Nsa Hacker Tools
- Hacking Tools Windows 10
- Android Hack Tools Github
- Hacker Hardware Tools
- Pentest Tools Find Subdomains
- Hacker Tools For Pc
- Hack Tool Apk No Root
- Beginner Hacker Tools
- Hacker Tools For Windows
- Pentest Tools Apk
- Hacking Tools Online
- Usb Pentest Tools
- Hacker Tools
- Hack Rom Tools
- Hack Tools Mac
- Hacking Tools 2019
- Beginner Hacker Tools
- Install Pentest Tools Ubuntu
- Hacker Search Tools
- Hacking Apps
- Hacker Tools
- Hacking Tools Github
- Hacking Tools For Mac
- Pentest Tools Tcp Port Scanner
- Hacker Tools Apk
- Hack Tools For Ubuntu
- Android Hack Tools Github
- Hacking App
- Pentest Tools For Android
- Hacking Tools For Pc
- Top Pentest Tools
- Hak5 Tools
- Pentest Automation Tools
- Pentest Tools
- Hack Tools Pc
- Pentest Tools Website
- What Are Hacking Tools
- Hack Tools For Games
- Tools Used For Hacking
- Hack Rom Tools
- Hacking Tools Free Download
- Pentest Tools Nmap
- Hack Tools Mac
- Hack Tools For Games
- Pentest Tools Port Scanner
- Beginner Hacker Tools
- Pentest Recon Tools
- Install Pentest Tools Ubuntu
- Hack Tool Apk No Root
- Hacking Tools For Windows
- Hacker Search Tools
- Pentest Tools Download
- Hack Tools For Ubuntu
- Hacker Tools Hardware
- Hacking Tools For Windows Free Download
- Pentest Tools Free
- Github Hacking Tools
- Hacking Tools
- Hacking Tools Kit
- Pentest Tools Website
- Pentest Tools Port Scanner
- Hacker Tools Github
- Pentest Tools Android
- Nsa Hack Tools Download
- Black Hat Hacker Tools
- Hacking Tools For Mac
- Hackrf Tools
- Hacking Tools For Kali Linux
- Hack Tools Pc
- Wifi Hacker Tools For Windows
- Hacking Tools Hardware
- Install Pentest Tools Ubuntu
- Hacker Hardware Tools
- Pentest Tools Website Vulnerability
- Hacker Tools Mac
- Hacker Tools Hardware
- Hack Tools For Games
- Pentest Tools
- Github Hacking Tools
- Pentest Tools
- Hack App
domingo, 4 de junio de 2023
How Do I Get Started With Bug Bounty ?
How do I get started with bug bounty hunting? How do I improve my skills?
These are some simple steps that every bug bounty hunter can use to get started and improve their skills:
Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.
Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".
Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.
Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.
Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.
Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.
Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.
A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.
These are some simple steps that every bug bounty hunter can use to get started and improve their skills:
Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.
Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".
Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.
Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.
Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.
Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.
Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.
A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.
Related articles
- Pentest Tools Kali Linux
- Free Pentest Tools For Windows
- Usb Pentest Tools
- Hack Website Online Tool
- Underground Hacker Sites
- Pentest Tools Kali Linux
- Hacker Techniques Tools And Incident Handling
- Beginner Hacker Tools
- Easy Hack Tools
- Hacker Tools Free Download
- Hack Tools Github
- Nsa Hack Tools
- Hacker Tools Apk Download
- Hacking App
- Hacker Tools Online
- How To Make Hacking Tools
- Hack Tools Online
- New Hack Tools
- Usb Pentest Tools
- Best Hacking Tools 2019
- Hack Tools
- Pentest Tools Alternative
- Kik Hack Tools
- Hack App
- Hack Tool Apk
- Hack Tools
- Hacking Tools Github
- Hacker Tools 2019
- World No 1 Hacker Software
- Hack Tools
- Growth Hacker Tools
- Easy Hack Tools
- Pentest Tools
- Growth Hacker Tools
- How To Hack
- Install Pentest Tools Ubuntu
- Hacking App
- Hacker Tools For Windows
- Hacking Tools Hardware
- Hacker Tools Online
- Hacking Tools Download
- Pentest Tools For Mac
- Hack Tools For Windows
- Hack Tool Apk
- Hacking Tools Kit
- Growth Hacker Tools
- Hacking Tools Hardware
- Hack Tools Pc
- Hack Tools For Mac
- Black Hat Hacker Tools
- How To Hack
- Hacking Tools Hardware
- Hack Tools For Ubuntu
- Pentest Tools Free
- Usb Pentest Tools
- Hacking Tools For Beginners
- Hacking Tools Name
- Hack Apps
- Hacker Tools Free
- Hacker Tools Linux
- Hack Tools For Ubuntu
- How To Make Hacking Tools
- Nsa Hacker Tools
- Hack Tool Apk No Root
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Usb
- Hack Tools Pc
- Hacker Tools Mac
- Blackhat Hacker Tools
- Pentest Tools Linux
- Hacker Security Tools
- Nsa Hacker Tools
- Hacking Tools Kit
- Pentest Tools Website
- Pentest Tools Website
- Hacking Tools 2020
- Pentest Tools For Windows
- Hacker Tools Free Download
- Pentest Tools For Android
- Hacker Tools 2020
- Hacking Tools For Windows 7
- Free Pentest Tools For Windows
Suscribirse a:
Comentarios (Atom)





