Projects STRLCPY Cipherops Files
🤬
19c56f30
ROOT /
thread-by-archangeldday-on-thread-reader-app.md
135 lines | UTF-8 | 5 KB

Thread by @ArchAngelDDay on Thread Reader App

douglasday.eth Profile picture

100 (very) short bug bounty rules:

1/ Spend at least 30 minutes on a new target
2/ Look for “No”s
3/ Use Italics Tags in your inputs instead of XSS payloads
4/ Focus on SaaS apps that are multi-tenant
5/ Buy Burp Pro

6/ On a new target go straight to the User Management section
7/ See if inviting an existing user to your org exposes their name
8/ See if inviting an existing user removes them from their own org
9/ If the scope has a wildcard, use sub finder to find subdomains

10/ Run HTTPX on the list of subdomains to narrow down alive targets
11/ On an app you’re not familiar with, use it like a normal user first
12/ If the docs say you can’t do X, but you can do X then you have a bug
13/ Use match & replace rules to find new endpoints

14/ Budget time into your week specifically for hacking
15/ Give yourself a no-bug time limit. I do 3 hours.
16/ Go back to old dupes and see if you can still reproduce.
17/ Look for “+2” in your reputation log to find dupes that should be now.
18/Ask for help from other hackers

19/ Make your report a conversation, not a sales pitch
20/ Accept & expect that dupes will happen
21/ File & Forget
22/ If an endpoint has “api/v2/“, try “api/v1/”
23/ If an endpoint has “api/v2”, try removing the “v2” altogether

24/ 6 $1000 Mediums pay more than 1 $5,000 crit. Don’t ignore any bugs
25/ Lows are still bugs that should be filed
26/ Be kind to your triager
27/ Say “thank you” when you get a bounty

28/ If an app uses UUIDs, you can still look for IDORs. Just set “AC:H”.
29/ If UUID IDORs exist, then look for an endpoint that exposes UUIDs
30/ Pin your success on whether your followed your plan, not if you found bugs

31/ A program that has a lot of hackers doesn’t mean there isn’t low-hanging fruit
32/ Going deep _will_ payoff
33/ Working with new hackers will payoff in dividends
34/ Don’t be jealous

35/ Bug Bounty income isn’t consistent. Be okay with peaks & valleys for your own sanity
36/ If you find a bug that’s OOS, still ask the customer if they care
37/ There’s no end. Enjoy the journey
38/ Have a hobby that’s not related to hacking

39/ Have friends that don’t hack
40/ Figure out what time of day you hack the best. Late nights aren’t for me.
41/ Spend that extra 2 minutes to make your report look/read nice
42/ “Subscribe” to programs that pay well and have good scope

43/ Don’t whine on Twitter about a single report. Or at all for that matter.
44/ IDORs and Privilege Escalations are a great place to start
45/ Unmet expectations lead to disappointment
46/ Teach someone else how to hack
47/ Time spent reading/learning is time-well spent

48/ Focus on programs that you actually use in your day-to-day
49/ Establish a relationship with the program
50/ Try asking the program what types of bugs they want to see
51/ Look at a programs leaderboard to see who you should collar with

52/ When collaborating, an even bounty split eliminates hassle
53/ Take a break when you stop having fun
54/ At an LHE, start hacking ahead of time
55/ Look for programs that are active in resolving reports

56/ Look for programs that haven’t awarded a lot recently
57/ Look for programs that have collaboration enabled
58/ Look for programs that don’t list out a bunch of known issues
59/ Look for programs that have a history of adding new scope

60/ Change your strategy if you’ve gone a while without a finding
61/ If you’re on a roll, keep doing what you’re doing
62/ But don’t let success keep you from evolving/growing
63/ Compare yourself against yourself from last year
64/ Maintain online presence for new opportunities

65/ Be thankful for failure
66/ Read disclosed reports
67/ Focus on one program at a time. Cycle if you get bored.
68/ Don’t spray XSS payloads everywhere
69/ If possible, work at a company that has a BBP

70/ Spend bounty money on tools that will generate more bounties
71/ Budget a specific amount of your bounties for fun. And stick to it.
72/ When hacking a store, don’t be afraid to make small purchases
73/ Look for changes in JS files to know when there may be new functionality

74/ Look for references to subdomains in a company’s GH repos
75/ Look for references to subdomains in employee’s GH repos
76/ If the app uses Intercom, try booting it with another email
77/ Look for second-degree IDORs

78/ SSRFs exist when the app makes any external request. Look for these requests.
79/ Look for actuator endpoints
80/ Find hackers that hack differently than you.
81/ Try hacking in a different room of the house
82/ Try hacking at a different location altogether

83/ If you find the same bug on different endpoints, file as different bugs
84/ Try always having some pending bugs in your pipeline
85/ Break your yearly bounty goal into monthly goals
86/ Know when a bounty isn’t worth fighting over

87/ Push back gently when a report gets downgraded
88/ Use the leaderboard as motivation, not as comparison
89/ Don’t re-invent the wheel when a tool exists
90/ Don’t be afraid to build the wheel if the tool doesn’t
91/ Try collabing in real time over video chat

92/ Always ask why something works the way it does
93/ When collabing, don’t be afraid to be the underperformer
94/ When collabing, don’t get salty about being the oqerperformer
95/ Use mediation, but use it sparingly
96/ Be generous with your earnings

97/ Hack for fun, not for a paycheck
98/ LHEs are a privilege, not an expectation
99/ Programs are your friend, not your adversary. Work with them
100/ The platform is your friend, not your adversary. Work with them

• • •

Missing some Tweet in this thread? You can try to force a refresh!!missing!!

 

Please wait...
Page is in error, reload to recover