Preparation
Build a local testlab
Essentials
Introduction
What?
Why?
How?
Bug bounty hunting methodology
Scope
High-level testing of discovered targets
Reviewing all applications
Fuzzing for errors to expose flaws
Exploiting vulnerabilities to generate POCs
Silent features
Clarity
Depth
Respect
Writing a report
Descriptive title
Description or summary
Proof of Concept
Example PoC: Manipulating the WebSocket handshake
Severity assessment
Exploitability
Impact
Remediation
Validate
Resources
Screencasting PoCs
Introduction
What?
Why?
How?
Installing OBS Studio
Flatpak
First window
Documentation
Installing Shotcut
Flatpak
First window
Documentation
Assets to hunt in
Web application hacking
Hacking APIs
IoT hacking
Buffer overflow exploits
Bug bounty hunting
Ty Myrddin Home
Unseen University
Improbability Blog
About
Contact
Index