Bug Bounty Hunting Methodology
This page contains a streamlined methodology tailored for Bug Bounty Hunting, Web Application Penetration Testing (WAPT), and Vulnerability Assessment and Penetration Testing (VAPT). It serves as a practical guide for Red Teamers, Blue Teamers, and CTF players, focusing on key phases like Reconnaissance, Scanning, Exploitation, Post-Exploitation, and Reporting. Each phase includes actionable steps and tools, making it a comprehensive resource for systematically identifying and exploiting vulnerabilities in web applications and networks.
Content
Installing Tools and Wordlists
- hackify.sh: Use this to install important tools and wordlists.
- Top tools list: Remaining tools can be installed manually.
Target Enumeration
- h1asset by adysec, h1domains by zricethezav, Inventory by Trickest, bounty-targets-data by arkadiyt, bug-bounty-recon-dataset by inth3wild
- Google dork https://github.com/sushiwushi/bug-bounty-dorks/blob/master/dorks.txt
- Bug Bounty Hunting Platforms
- https://github.com/projectdiscovery/public-bugbounty-programs For Downloading subdomains of all programs https://chaos.projectdiscovery.io/
- Find New Acquisitions by target companies https://index.co/company/COMPANY/acquirees. Example: https://index.co/company/google/acquirees
- Reverse IP to wider scope in case of red teaming Hacker Target, ViewDNS.info and SecurityTrails Account Needed.
- Subdomain Automation
- Subdomain Enumeration subauto Subdomain Enumeration Tool by ZishanAdThandar
git clone https://github.com/ZishanAdThandar/Hackify && cd Hackify && bash hackify.sh–> - Subdomain Takeover Greping subzy vulnerable results
cat *Takeover.txt |grep " \[ "ORcat *Takeover.txt |grep " \[ \|EdOverflow"and verify with can-i-take-over-xyz by EdOverflow - Subdomain Takeover with Nuclei
nuclei -l *https.txt -t takeovers
- Subdomain Enumeration subauto Subdomain Enumeration Tool by ZishanAdThandar
Fully Automated Pentesting
Scan
Port Scan
- naabu + nmap
naabu -list domain.comsubs.txt >>naabu.txtornaabu -list domain.comips.txt >>naabu.txtnaabu -l instamojo.comsubs.txt -nmap-cli 'nmap --script vuln -Pn -T5 -A' | tee -a domain.comnmapvuln.txt
Google DORK Scan
- DorkScout: Golang tool to automate google dork scan against the entiere internet or specific targets.
- pagodo (Passive Google Dork)
- FGDS
curl https://raw.githubusercontent.com/IvanGlinkin/Fast-Google-Dorks-Scan/master/FGDS.sh -s |bash -s domain.com - sitedorks by Zarcolio
- git-hound
- Install git-hound with Hackify or from repo release then
which git-hound - Login Details:
nano /root/go/bin/config.ymlExample: https://github.com/tillson/git-hound/blob/main/config.example.yml - Entering OTP
git-hound --otp-code 1234568 git-hound --config-file /root/go/bin/config.yml --subdomain-file subdomains.txt
- Install git-hound with Hackify or from repo release then
Cloudflare Bypass
- SecurityTrails, ViewDNS.info: For DNS history and records.
- dnsdumpster.com
- Shodan, Censys: For Internet device searches.
- Google, Bing: For cached search engine results.
- crt.sh, Censys, CertDB: For certificate transparency logs.
dig: To find DNS misconfigeration ip leak.
Scanners
- Burp Suite Pro [Windows Linux] File: https://portswigger.net/burp/pro Loader:…… Zer0DayLab
- Burp Bounty Pro Extension
- Burp Turbo Intruder
- HUNT by BugCrowd
- Unlimited BurpSuite Extensions
- nuclei with nuclei-templates or external templates
- nuclei template install (as root):
nuclei -ut - nuclei command:
nuclei -l httpsubdomain.txt -resume nuclei.txt -nmhe[rate-limit 10/second to avoid error of rapid request,-nmheto skip error]
- nuclei template install (as root):
- Acunetix Pro [Windows Linux] Pwn3rzs
- Creating Acunetix CSV list from https links
for i in $(cat domain.comhttpssubdomain.txt); do echo \"$i\", \" \"; done > domain.comacunetix.csv
- Creating Acunetix CSV list from https links
- Afrog
afrog -T domain.comhttpsubs.txt - Owasp NetTracker
- Wapiti [Linux]
- XAttacker
perl XAttacker.pl -l list.txt
Exploitation
- RCE: Commix
- SQL Injection: sqlmap, jSQL or NoSQLMap
- Cross Site Scripting: XSStrike, XSSxrapy
- File inclusion: LFIMap, liffy
- Fileupload: fuxploider
- CORS: Corsy
- CRLF Injection: crlfuzz
- GraphQL: batchql by assetnote, INQL Scanner Burpsuite Extension or INQL Script
- 403 bypass: bypass-403 by iamj0ker, 403bypasser by yunemse48, 4-ZERO-3 by Dheerajmadhukar or 403 Bypasser Burpsuite Extension
- GF Pattern Commands: Gf-Patterns
- Hidden Link Discovery: LinkFinder by GerbenJavado
- Hidden Paramter Discovery: x8
FFUF
- Subdomain Enueration:
ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -u https://FUZZ.target.com -H "Host: FUZZ.target.com" - Virtual Host Discovery:
ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -u https://target.com -H "Host: FUZZ.target.com" - Parameter Fuzzing:
ffuf -w /usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt -u https://target.com/page.php?FUZZ=value - Directory/Files Enumeration:
ffuf -w /usr/share/seclists/Discovery/Web-Content/common.txt -u https://target.com/FUZZ/ - Fuzzing HTTP Headers:
ffuf -w /usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt -u https://target.com -H "FUZZ: test" - Fuzzing Post Data:
ffuf -w /usr/share/seclists/Fuzzing/fuzz.txt -u https://target.com/login -X POST -d "username=FUZZ&password=pass"
One Liners
Manual Exploitation
Manual exploitation is often the most effective way to identify vulnerabilities. Unlike automated scanners, manual techniques allow you to discover bugs that might otherwise go unnoticed. To perform manual exploitation, you can use tools such as Burp Suite, Zed Attack Proxy, Caido, mitmproxy, Postman, and Browser Inspector. These tools enable you to analyze and manipulate HTTP requests and responses, inspect web elements, and more, allowing for a deeper investigation into potential security flaws. With BurpSuite you can analyze traffic and check each request in repeater with manual manipulation or intruder with automated manipulation of different entry points for vulnerabilities. You need to different Web App Vulnerablities and bypasses to find bugs using this method.
- Burp Extenders from BApp store or : Turbo Intruder or many others https://github.com/snoopysecurity/awesome-burp-extensions
- Burp BChecks: BChecks Collection, PortSwigger BChecks, Custom BChecks etc