lunes, 5 de junio de 2023

Hackerhubb.blogspot.com

Hackerhubb.blogspot.comMore articles
  1. Hack And Tools
  2. Hacking Tools 2020
  3. Pentest Box Tools Download
  4. Pentest Tools List
  5. Nsa Hack Tools
  6. Hacker Tools Apk
  7. Hacking Tools Name
  8. Hack And Tools
  9. Hack Tools For Ubuntu
  10. Tools For Hacker
  11. Hacker Tools Software
  12. Pentest Tools For Android
  13. What Are Hacking Tools
  14. Pentest Tools Online
  15. Easy Hack Tools
  16. Hacking Tools For Beginners
  17. Pentest Tools Open Source
  18. Pentest Tools Windows
  19. Hacker Tools Mac
  20. Hackers Toolbox
  21. Best Hacking Tools 2019
  22. Pentest Tools For Mac
  23. Hacker Tools Apk Download
  24. Kik Hack Tools
  25. Hacker Tools Hardware
  26. Pentest Tools Subdomain
  27. New Hack Tools
  28. Kik Hack Tools
  29. Hack Tool Apk
  30. Pentest Tools Url Fuzzer
  31. Hack Rom Tools
  32. Hacking Tools And Software
  33. Hacker Tools Windows
  34. Hack Tool Apk
  35. Hacking Tools For Windows
  36. Black Hat Hacker Tools
  37. Hacking Tools For Mac
  38. What Are Hacking Tools
  39. Nsa Hack Tools
  40. Pentest Tools Url Fuzzer
  41. Hack Tools Online
  42. Hacking Tools Mac
  43. Pentest Tools Website Vulnerability
  44. Hacking Tools Windows
  45. Hacking Tools 2019
  46. Hacker Tools Windows
  47. Hacking Tools Software
  48. Hack App
  49. Hacking Tools Name
  50. Tools Used For Hacking
  51. Pentest Tools
  52. Hacker Security Tools
  53. Install Pentest Tools Ubuntu
  54. Pentest Tools List
  55. New Hacker Tools
  56. Pentest Box Tools Download
  57. Hacks And Tools
  58. Hack Tools Online
  59. Pentest Tools List
  60. Hacker Tools Hardware
  61. Hacking Tools 2020
  62. What Is Hacking Tools
  63. Nsa Hack Tools Download
  64. Hack Tools
  65. Pentest Tools Alternative
  66. Hacker Security Tools
  67. Best Pentesting Tools 2018
  68. Hacker Tools List
  69. Pentest Tools Free
  70. Hacking Tools Free Download
  71. Pentest Tools Alternative
  72. How To Make Hacking Tools
  73. Pentest Tools For Mac
  74. How To Make Hacking Tools
  75. Hacker Techniques Tools And Incident Handling
  76. Kik Hack Tools
  77. Growth Hacker Tools
  78. Hacker Hardware Tools
  79. Tools Used For Hacking
  80. Hacker Tools Mac
  81. Hack Tool Apk
  82. Hacking Tools Online
  83. Pentest Recon Tools
  84. Hack Tools

Attacking Financial Malware Botnet Panels - SpyEye

This is the second blog post in the "Attacking financial malware botnet panels" series. After playing with Zeus, my attention turned to another old (and dead) botnet, SpyEye. From an ITSEC perspective, SpyEye shares a lot of vulnerabilities with Zeus. 

The following report is based on SpyEye 1.3.45, which is old, and if we are lucky, the whole SpyEye branch will be dead soon. 

Google dorks to find SpyEye C&C server panel related stuff:

  • if the img directory gets indexed, it is rather easy, search for e.g. inurl:b-ftpbackconnect.png
  • if the install directory gets indexed, again, easy, search for e.g. inurl:spylogo.png
  • also, if you find a login screen, check the css file (style.css), and you see #frm_viewlogs, #frm_stat, #frm_botsmon_country, #frm_botstat, #frm_gtaskloader and stuff like that, you can be sure you found it
  • otherwise, it is the best not to Google for it, but get a SpyEye sample and analyze it
And this is how the control panel login looks like, nothing sophisticated:


The best part is that you don't have to guess the admin's username ;)

This is how an average control panel looks like:


Hack the Planet! :)

Boring vulns found (warning, an almost exact copy from the Zeus blog post)


  • Clear text HTTP login - you can sniff the login password via MiTM, or steal the session cookies
  • No password policy - admins can set up really weak passwords
  • No anti brute-force - you can try to guess the admin's password. There is no default username, as there is no username handling!
  • Password autocomplete enabled - boring
  • Missing HttpOnly flag on session cookie - interesting when combining with XSS
  • No CSRF protection - e.g. you can upload new exe, bin files, turn plugins on/off :-( boring. Also the file extension check can be bypassed, but the files are stored in the database, so no PHP shell this time. If you check the following code, you can see that even the file extension and type is checked, and an error is shown, but the upload process continues. And even if the error would stop the upload process, the check can be fooled by setting an invalid $uptype. Well done ...
        if ($_FILES['file']['tmp_name'] && ($_FILES['file']['size'] > 0))         {                 $outstr = "<br>";                 set_time_limit(0);                 $filename = str_replace(" ","_",$_FILES['file']['name']);                 $ext = substr($filename, strrpos($filename, '.')+1);                 if( $ext==='bin' && $uptype!=='config' ) $outstr .= "<font class='error'>Bad CONFIG extension!</font><br>";                 if( $ext==='exe' && $uptype!=='body' && $uptype!=='exe' ) $outstr .= "<font class='error'>Bad extension!</font><br>";                  switch( $uptype )                 {                 case 'body': $ext = 'b'; break;                 case 'config': $ext = 'c'; break;                 case 'exe': $ext = 'e'; break;                 default: $ext = 'e';                 }                 $_SESSION['file_ext'] = $ext;                 if( isset($_POST['bots']) && trim($_POST['bots']) !== '')                 {                         $bots = explode(' ', trim($_POST['bots']));                         //writelog("debug.log", trim($_POST['bots']));                         $filename .= "_".(LastFileId()+1);                 }                 if( FileExist($filename) ) $filename .= LastFileId();                 $tmpName  = $_FILES['file']['tmp_name'];                 $fileSize = $_FILES['file']['size'];                 $fileType = $_FILES['file']['type'];                 ## reading all file for calculating hash                 $fp = fopen($tmpName, 'r'); 
  • Clear text password storage - the MySQL passwords are stored in php files, in clear text. Also, the login password to the form panel is stored in clear text.
  • MD5 password - the passwords stored in MySQL are MD5 passwords. No PBKDF2, bcrypt, scrypt, salt, whatever. MD5. Just look at the pure simplicity of the login check, great work!
$query = "SELECT * FROM users_t WHERE uPswd='".md5($pswd)."'";
  • ClickJacking - really boring stuff

SQL injection


SpyEye has a fancy history of SQL injections. See details here, here, here, video here and video here.

It is important to highlight the fact that most of the vulnerable functions are reachable without any authentication, because these PHP files lack user authentication at the beginning of the files.

But if a C&C server owner gets pwned through this vuln, it is not a good idea to complain to the developer, because after careful reading of the install guide, one can see:

"For searching info in the collector database there is a PHP interface as formgrabber admin panel. The admin panel is not intended to be found on the server. This is a client application."

And there are plenty of reasons not to install the formgrabber admin panel on any internet reachable server. But this fact leads to another possible vulnerability. The user for this control panel is allowed to remotely login to the MySQL database, and the install guide has pretty good passwords to be reused. I mean it looks pretty secure, there is no reason not to use that.

CREATE USER 'frmcpviewer' IDENTIFIED BY 'SgFGSADGFJSDGKFy2763272qffffHDSJ'; 

Next time you find a SpyEye panel, and you can connect to the MySQL database, it is worth a shot to try this password.

Unfortunately the default permissions for this user is not enough to write files (select into outfile):

Access denied for user 'frmcpviewer' (using password: YES)

I also made a little experiment with this SQL injection vulnerability. I did set up a live SpyEye botnet panel, created the malware install binaries (droppers), and sent the droppers to the AV companies. And after more and more sandboxes connected to my box, someone started to exploit the SQL injection vulnerability on my server!

63.217.168.90 - - [16/Jun/2014:04:43:00 -0500] "GET /form/frm_boa-grabber_sub.php?bot_guid=&lm=3&dt=%20where%201=2%20union%20select%20@a:=1%20from%20rep1%20where%20@a%20is%20null%20union%20select%20@a:=%20@a%20%2b1%20union%20select%20concat(id,char(1,3,3,7),bot_guid,char(1,3,3,7),process_name,char(1,3,3,7),hooked_func,char(1,3,3,7),url,char(1,3,3,7),func_data)%20from%20rep2_20140610%20where%20@a=3%23 HTTP/1.1" 200 508 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E)"

Although the query did not return any meaningful data to the attacker (only data collected from sandboxes), it raises some legal questions.

Which company/organization has the right to attack my server? 
  • police (having a warrant)
  • military (if we are at war)
  • spy agencies (always/never, choose your favorite answer)
  • CERT organisations?

But, does an AV company or security research company has the legal right to attack my server? I don't think so... The most problematic part is when they hack a server (without authorization), and sell the stolen information in the name of "intelligence service". What is it, the wild wild west?

The SQLi clearly targets the content of the stolen login credentials. If this is not an AV company, but an attacker, how did they got the SpyEye dropper? If this is an AV company, why are they stealing the stolen credentials? Will they notify the internet banking owners about the stolen credentials for free? Or will they do this for money?

And don't get me wrong, I don't want to protect the criminals, but this is clearly a grey area in the law. From an ethical point of view, I agree with hacking the criminal's servers. As you can see, the whole post is about disclosing vulns in these botnet panels. But from a legal point of view, this is something tricky ... I'm really interested in the opinion of others, so comments are warmly welcome.

On a side note, I was interested how did the "attackers" found the SpyEye form directory? Easy, they brute-forced it, with a wordlist having ~43.000 entries.

(Useless) Cross site scripting


Although parts of the SpyEye panel are vulnerable to XSS, it is unlikely that you will to find these components on the server, as these codes are part of the install process, and the installer fails to run if a valid install is found. And in this case, you also need the DB password to trigger the vuln...



Session handling


This is a fun part. The logout button invalidates the session only on the server side, but not on the client side. But if you take into consideration that the login process never regenerates the session cookies (a.k.a session fixation), you can see that no matter how many times the admin logs into the application, the session cookie remains the same (until the admin does not close the browser). So if you find a session cookie which was valid in the past, but is not working at the moment, it is possible that this cookie will be valid in the future ...

Binary server


Some parts of the SpyEye server involve running a binary server component on the server, to collect the form data. It would be interesting to fuzz this component (called sec) for vulns.

Log files revealed


If the form panel mentioned in the SQLi part is installed on the server, it is worth visiting the <form_dir>/logs/error.log file, you might see the path of the webroot folder, IP addresses of the admins, etc.

Reading the code


Sometimes reading the code you can find code snippets, which is hard to understand with a clear mind:

$content = fread($fp, filesize($tmpName)); if ( $uptype === 'config' )     $md5 = GetCRC32($content); else $md5 = md5($content); .... <script> if (navigator.userAgent.indexOf("Mozilla/4.0") != -1) {         alert("Your browser is not support yet. Please, use another (FireFox, Opera, Safari)");         document.getElementById("div_main").innerHTML = "<font class=\'error\'>ChAnGE YOuR BRoWsEr! Dont use BUGGED Microsoft products!</font>"; } </script> 

Decrypting SpyEye communication

It turned out that the communication between the malware and C&C server is not very sophisticated (Zeus does a better job at it, because the RC4 key stream is generated from the botnet password).

function DeCode($content) {         $res = '';         for($i = 0; $i < strlen($content); $i++)         {                 $num = ord($content[$i]);                 if( $num != 219) $res .= chr($num^219);         }         return $res; } 
Fixed XOR key, again, well done ...
This means that it is easy to create a script, which can communicate with the SpyEye server. For example this can be used to fill in the SpyEye database with crap data.


import binascii import requests import httplib, urllib  def xor_str(a, b):     i = 0     xorred = ''     for i in range(len(a)):         xorred += chr(ord(a[i])^b)     return xorred              b64_data= "vK6yv+bt9er17O3r6vqPnoiPjZb2i5j6muvo6+rjmJ/9rb6p5urr6O/j/bK+5uP16/Xs7evq9ers7urv/bSo5u316vXs7evq/a6v5pq/trK1/bi4qbjm453j6uPv7Or9tr/u5um+uuvpve3p7eq/4+vsveLi7Lnqvrjr6ujs7rjt7rns/au3vOa5sre3srW8s7q2tr6p4Lm3tLiw4LmuvKm+q7Spr+C4uPu8qbq5ub6p4Li4vKm6ubm+qeC4qb6/sq+8qbq54LiuqK+0tri0tbW+uK+0qeC/v7So4L+1qLqrsuC+trqyt7ypurm5vqngvb24vqmvvKm6ubm+qeC9/aivuq/mtLW3srW+" payload =xor_str (binascii.a2b_base64(b64_data), 219)  print ("the decrypted payload is: " + payload) params = (binascii.b2a_base64(xor_str(payload,219))) payload = {'data': params} r = requests.post("http://spyeye.localhost/spyeye/_cg/gate.php", data=payload) 

Morale of the story?


Criminals produce the same shitty code as the rest of the world, and thanks to this, some of the malware operators get caught and are behind bars now. And the law is behind the reality, as always.

Related posts
  1. Hack Tools Online
  2. Hacking Apps
  3. Top Pentest Tools
  4. Hacking Tools Download
  5. How To Make Hacking Tools
  6. Pentest Tools Find Subdomains
  7. Hacking Tools Mac
  8. Hack Tools For Games
  9. Computer Hacker
  10. Hacker Tools Windows
  11. Tools For Hacker
  12. Pentest Tools Windows
  13. Ethical Hacker Tools
  14. How To Hack
  15. Hacker Tools Free
  16. Best Hacking Tools 2020
  17. Pentest Tools
  18. Hacker Tools Github
  19. How To Hack
  20. Pentest Tools Online
  21. Hack Tools Pc
  22. Hacking Tools For Pc
  23. Pentest Tools Android
  24. Hacker Tools For Windows
  25. Hacker Security Tools
  26. Hack App
  27. Best Pentesting Tools 2018
  28. Hacker Hardware Tools
  29. Pentest Tools Online
  30. Best Pentesting Tools 2018
  31. What Is Hacking Tools
  32. Pentest Tools List
  33. Hack Tools Download
  34. Usb Pentest Tools
  35. Hacking Tools For Kali Linux
  36. Hacking Tools For Windows Free Download
  37. Blackhat Hacker Tools
  38. Hacking Tools Pc
  39. Hacking Tools Software
  40. Hack Tool Apk
  41. Hacker Tool Kit
  42. Best Hacking Tools 2020
  43. Hacker Hardware Tools
  44. Hacker Tools For Mac
  45. Best Hacking Tools 2019
  46. Hacker Tools Apk
  47. Hack Tools For Mac
  48. Nsa Hacker Tools
  49. Bluetooth Hacking Tools Kali
  50. Best Hacking Tools 2019
  51. Hacking Tools For Beginners
  52. Hack Apps
  53. Pentest Tools Url Fuzzer
  54. Pentest Tools Online
  55. Usb Pentest Tools
  56. Hack Tools Download
  57. Wifi Hacker Tools For Windows
  58. Hacking App
  59. Hacking Tools Usb
  60. Computer Hacker
  61. Install Pentest Tools Ubuntu
  62. Hacking Tools Windows 10
  63. Hacking Tools And Software
  64. Hacker Tools Apk
  65. Hacker Tools Mac
  66. Hacker Tools For Windows
  67. Hacker Techniques Tools And Incident Handling
  68. Computer Hacker
  69. Pentest Tools Framework
  70. Hack Tools Mac
  71. Pentest Tools For Ubuntu

2020-12-13 SUNBURST SolarWinds Backdoor Samples

Reference

I am sure you all saw the news. 

Links updated: Jan 19, 2023


The Resurgence of Russian Threat Actor, NOBELIUM

 
Well, here are the Sunburst binaries. 
Here is a Sunburst malware analysis walk-through video by Colin Hardy




Hashes






SolarWinds.Orion.Core.BusinessLayer.dll


 Trojan:MSIL/Solorigate.B!dha
A Variant Of MSIL/SunBurst.A

SolarWinds.Orion.Core.BusinessLayer.dll
32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77
dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b
eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed
c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77
ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c
019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134
ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6
a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc
d3c6785e18fba3749fb785bc313cf8346182f532c59172b69adfb31b96a5d0af
0f5d7e6dfdd62c83eb096ba193b5ae394001bac036745495674156ead6557589
6e4050c6a2d2e5e49606d96dd2922da480f2e0c70082cc7e54449a7dc0d20f8d

CORE-2019.4.5220.20574-SolarWinds-Core-v2019.4.5220-Hotfix5.msp
d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600

appweblogoimagehandler.ashx.b6031896.dll
c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71

TEARDROP
b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07
1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c

RAINDROP
be9dbbec6937dfe0a652c0603d4972ba354e83c06b8397d6555fd1847da36725

This is the compromised installer file ( was still on Solarwinds update downloads  on Dec 14, 2020)

File size 419.76 MB
CoreInstaller.msi

ad2fbf4add71f61173975989d1a18395afb8538ed889012b9d2e21c19e98bbd1

2020-04-21 17:31:02
SolarWinds Orion Core Services 2020.2
{77E2D294-3D5C-4D93-ADF1-884CCEAD93B0}
File Version Information
Date signed 05:32 PM 04/21/2020
Signers
Solarwinds Worldwide, LLC
Symantec Class 3 SHA256 Code Signing CA
VeriSign
VT - 0 (Dec 14, 2020)

If you unzip, check 

SolarWinds.Orion.Core.BusinessLayer.dll under OrionCore







Related news


  1. Pentest Tools For Windows
  2. Physical Pentest Tools
  3. Hacker Tools Apk Download
  4. Hacking Tools Software
  5. Hacking Tools For Games
  6. Hacker Tools Apk Download
  7. Pentest Tools Framework
  8. Hack And Tools
  9. Hack Tool Apk No Root
  10. Hacker Tools Windows
  11. Hak5 Tools
  12. Pentest Tools For Ubuntu
  13. Hacking Tools Online
  14. Hack Tools
  15. Hacker Tool Kit
  16. Hacking Tools
  17. Hacking Tools 2020
  18. Hacking Tools Windows 10
  19. Hacker Tools Apk
  20. Hacker Tools For Mac
  21. Hacking Tools Hardware
  22. World No 1 Hacker Software
  23. Pentest Tools Website
  24. Hacking Tools Usb
  25. Hacker Tools Github
  26. Hacking Tools Free Download
  27. Hacker Tools Online
  28. Hack Tools 2019
  29. Hacking Tools Online
  30. Hacking Tools Usb
  31. Pentest Tools Review
  32. Hacking Tools For Pc
  33. Hacker Tools Free Download
  34. Hacking Tools For Kali Linux
  35. Pentest Tools Apk
  36. Hacking Tools Download
  37. Hack Tools Github
  38. Underground Hacker Sites
  39. Hack Tools For Windows
  40. Hacker Tools 2019
  41. Hacking Tools Free Download
  42. Hacker Tools Windows
  43. Pentest Tools For Mac
  44. Hacking Tools Name
  45. Nsa Hack Tools Download
  46. Hack Rom Tools
  47. Pentest Tools Kali Linux
  48. Hacking Tools Hardware
  49. Beginner Hacker Tools
  50. What Are Hacking Tools
  51. Pentest Automation Tools
  52. Top Pentest Tools
  53. Hack Tools Download
  54. Hacking Tools Github
  55. Pentest Tools For Ubuntu
  56. Hack Tool Apk No Root
  57. Hacking Tools Kit
  58. Pentest Tools For Android
  59. Hack Tools For Mac
  60. Blackhat Hacker Tools
  61. Termux Hacking Tools 2019
  62. Pentest Tools For Windows
  63. Pentest Tools For Mac
  64. Hack Tools For Ubuntu
  65. Hacking Tools For Games
  66. Pentest Tools
  67. Pentest Tools Alternative
  68. Physical Pentest Tools
  69. Hacker Tools Windows
  70. Tools Used For Hacking
  71. Underground Hacker Sites
  72. Hacking Tools Software
  73. Hacking Tools For Windows 7
  74. Hacking Tools Software
  75. World No 1 Hacker Software
  76. Blackhat Hacker Tools
  77. Pentest Tools List
  78. Hacker Tools Free Download
  79. Nsa Hacker Tools
  80. Hacking Tools Windows 10
  81. Android Hack Tools Github
  82. Hacker Hardware Tools
  83. Pentest Tools Find Subdomains
  84. Hacker Tools For Pc
  85. Hack Tool Apk No Root
  86. Beginner Hacker Tools
  87. Hacker Tools For Windows
  88. Pentest Tools Apk
  89. Hacking Tools Online
  90. Usb Pentest Tools
  91. Hacker Tools
  92. Hack Rom Tools
  93. Hack Tools Mac
  94. Hacking Tools 2019
  95. Beginner Hacker Tools
  96. Install Pentest Tools Ubuntu
  97. Hacker Search Tools
  98. Hacking Apps
  99. Hacker Tools
  100. Hacking Tools Github
  101. Hacking Tools For Mac
  102. Pentest Tools Tcp Port Scanner
  103. Hacker Tools Apk
  104. Hack Tools For Ubuntu
  105. Android Hack Tools Github
  106. Hacking App
  107. Pentest Tools For Android
  108. Hacking Tools For Pc
  109. Top Pentest Tools
  110. Hak5 Tools
  111. Pentest Automation Tools
  112. Pentest Tools
  113. Hack Tools Pc
  114. Pentest Tools Website
  115. What Are Hacking Tools
  116. Hack Tools For Games
  117. Tools Used For Hacking
  118. Hack Rom Tools
  119. Hacking Tools Free Download
  120. Pentest Tools Nmap
  121. Hack Tools Mac
  122. Hack Tools For Games
  123. Pentest Tools Port Scanner
  124. Beginner Hacker Tools
  125. Pentest Recon Tools
  126. Install Pentest Tools Ubuntu
  127. Hack Tool Apk No Root
  128. Hacking Tools For Windows
  129. Hacker Search Tools
  130. Pentest Tools Download
  131. Hack Tools For Ubuntu
  132. Hacker Tools Hardware
  133. Hacking Tools For Windows Free Download
  134. Pentest Tools Free
  135. Github Hacking Tools
  136. Hacking Tools
  137. Hacking Tools Kit
  138. Pentest Tools Website
  139. Pentest Tools Port Scanner
  140. Hacker Tools Github
  141. Pentest Tools Android
  142. Nsa Hack Tools Download
  143. Black Hat Hacker Tools
  144. Hacking Tools For Mac
  145. Hackrf Tools
  146. Hacking Tools For Kali Linux
  147. Hack Tools Pc
  148. Wifi Hacker Tools For Windows
  149. Hacking Tools Hardware
  150. Install Pentest Tools Ubuntu
  151. Hacker Hardware Tools
  152. Pentest Tools Website Vulnerability
  153. Hacker Tools Mac
  154. Hacker Tools Hardware
  155. Hack Tools For Games
  156. Pentest Tools
  157. Github Hacking Tools
  158. Pentest Tools
  159. Hack App

domingo, 4 de junio de 2023

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

Related articles


  1. Pentest Tools Kali Linux
  2. Free Pentest Tools For Windows
  3. Usb Pentest Tools
  4. Hack Website Online Tool
  5. Underground Hacker Sites
  6. Pentest Tools Kali Linux
  7. Hacker Techniques Tools And Incident Handling
  8. Beginner Hacker Tools
  9. Easy Hack Tools
  10. Hacker Tools Free Download
  11. Hack Tools Github
  12. Nsa Hack Tools
  13. Hacker Tools Apk Download
  14. Hacking App
  15. Hacker Tools Online
  16. How To Make Hacking Tools
  17. Hack Tools Online
  18. New Hack Tools
  19. Usb Pentest Tools
  20. Best Hacking Tools 2019
  21. Hack Tools
  22. Pentest Tools Alternative
  23. Kik Hack Tools
  24. Hack App
  25. Hack Tool Apk
  26. Hack Tools
  27. Hacking Tools Github
  28. Hacker Tools 2019
  29. World No 1 Hacker Software
  30. Hack Tools
  31. Growth Hacker Tools
  32. Easy Hack Tools
  33. Pentest Tools
  34. Growth Hacker Tools
  35. How To Hack
  36. Install Pentest Tools Ubuntu
  37. Hacking App
  38. Hacker Tools For Windows
  39. Hacking Tools Hardware
  40. Hacker Tools Online
  41. Hacking Tools Download
  42. Pentest Tools For Mac
  43. Hack Tools For Windows
  44. Hack Tool Apk
  45. Hacking Tools Kit
  46. Growth Hacker Tools
  47. Hacking Tools Hardware
  48. Hack Tools Pc
  49. Hack Tools For Mac
  50. Black Hat Hacker Tools
  51. How To Hack
  52. Hacking Tools Hardware
  53. Hack Tools For Ubuntu
  54. Pentest Tools Free
  55. Usb Pentest Tools
  56. Hacking Tools For Beginners
  57. Hacking Tools Name
  58. Hack Apps
  59. Hacker Tools Free
  60. Hacker Tools Linux
  61. Hack Tools For Ubuntu
  62. How To Make Hacking Tools
  63. Nsa Hacker Tools
  64. Hack Tool Apk No Root
  65. How To Install Pentest Tools In Ubuntu
  66. Hacking Tools Usb
  67. Hack Tools Pc
  68. Hacker Tools Mac
  69. Blackhat Hacker Tools
  70. Pentest Tools Linux
  71. Hacker Security Tools
  72. Nsa Hacker Tools
  73. Hacking Tools Kit
  74. Pentest Tools Website
  75. Pentest Tools Website
  76. Hacking Tools 2020
  77. Pentest Tools For Windows
  78. Hacker Tools Free Download
  79. Pentest Tools For Android
  80. Hacker Tools 2020
  81. Hacking Tools For Windows 7
  82. Free Pentest Tools For Windows