Posts

Tips and Tricks for Bug-Bounty

  1. Sign up for Hackerone to get Petes book Webhacking 101 bit.ly/hackerone-stok 2. Watch anything you can from Jason Haddix just google it.  3. Watch all the tutorials and do the CTF on Hacker101 bit.ly/hacker101-stok  4. Sign up for Pentersterlab and try their stuff out! bit.ly/pentesterlab-stok  5. Watch everything on   https://www.bugcrowd.com/university   6. Sign up for Hackerone (bit.ly/hackerone-stok) Bugcrowd or any other BB platform.  7. Get a Burp pro license, its way better than getting a “ethical hacker course”   https://portswigger.net/   8. Find a program that you like and vibe with, its more fun to hack on a program or brand you like.  9. Don’t waste time on VDP’s  10. Don’t be discouraged that everyone else has automated everything, its just not true.  11. Always approach a target like you’re the first one there. Your view is unique.  12. Remember, Zero days can be new bugs in old code.  13. Be proud ...

Ethical Hacking - From Zero to Hero - A Summarization

Image
  Ethical Hacking What is Hacking? Hacking in simple words is defined as a process in which hackers use advantage of vulnerabilities of the system to intrude / penetrate in that system locally / remotely. Hacking can be used to steal or share private content of individual / company. Hacking is the process of identifying and exploiting weakness in a system or a network to gain unauthorized access to data and system resources. It can also be defined as an unauthorized intrusion into the information systems/networks by an attacker by compromising the security. Example of Hacking: Exploiting the weakness of default password to gain access to the data stored inside the system. What is Ethical Hacking? Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose ...