- Stanford CS 253 Web Security
- HTTP basics
- Networking basics
- Programming Basics
- Automation
- Linux basics
- Web Server Basics
- Computing Fundamentals
- Hacking Basics
- Stanford CS 253 Web Security - by @feross
- "This course is a comprehensive overview of web security. The goal is to build an understanding of the most common web attacks and their countermeasures. Given the pervasive insecurity of the modern web landscape, there is a pressing need for programmers and system designers to improve their understanding of web security issues."
In order to be able to learn what and how an application works, you need to be able to understand how you are communicating with it. This section is dedicated to all the resources to understand the HTTP basics.
- All in one resource
- HTTP basics
- Cookie security
- HTML parsing
- MIME sniffing
- Encoding sniffing
- Same-Origin Policy
- CSRF (Cross-Site Request Forgery)
- Request form
- Response form
- Response codes
- URL Encoding
Recon is a common terminology used in bug bounties. It’s great if you are already using tools to scan a range of IPs for open ports or find subdomain, however, you should first understand why these things matter and how they work.
- Terminology
- What is an IP?
- What are ports?
- What is DNS?
- Intermediate Security Testing with Kali Linux 2
- Network Fundamentals, A 19 part Video Series about Networking well explained for Beginners
Being a great programmer is not a requirement to be a successful hacker. However, having the ability to make an educated guess, may increase your chances of successfully identifying and exploiting an issue. In a number of cases, you may need to automate your work or know more than just the “basics” in order to escalate a bug with a medium severity to high/critical.
- HTML: HTML is very easy to learn and there are a ton of free resources for it. If you are interested in learning about XSS this should be your first step. If you prefer an interactive tool to learn about JavaScript, I highly recommend Codecademy or W3Schools!
- JavaScript: Once you have familiarized yourself with HTML, you should understand JavaScript since you will be using it to exploit XSS vulnerabilities. The usage of JavaScript isn’t just limited to when you are exploring XSS, so it’s a very handy programming language to know. If you prefer an interactive tool to learn about JavaScript, I highly recommend CodeCademy!
- SQL: You may have guessed It already, but you won’t be able to exploit complex SQL injection vulnerabilities before having any SQL knowledge. As always, if you prefer an interactive course, feel free to use CodeCademy! https://www.codecademy.com/learn/learn-sql http://www.sqlcourse.com/
You are welcome to skip this section if you think you’ll never need any automation or in depth web application knowledge. However I think learning bash in addition to one the following four languages may help you work smarter rather than harder.
- Bash
- Ruby
- Python
- Go(lang)
- Additional Resources:
- PHP
If you are looking into getting started with Bug Bounties with a focus on web, I highly recommend learning the nuts and bolts of what make a website work.
- Installing Apache, MySQL, PHP on Windows 10
- Installing Apache, MySQL, PHP on Ubuntu
- Setting Up Your Ubuntu Box for Pentest and Bug Bounty Automation
After creating your own web server, I highly recommend installing a CMS (like Wordpress or drupal) on your localhost to understand how it all works.
- Hopper's Roppers Computing Fundamentals
- This free course teaches the absolute basics of Linux, hardware, networking, operating systems, and scripting. Designed to get a complete beginner over the first big learning hurdles and so they can move on to anything else and succeed.
- Exeter Q-Step Resources
- Here, you will find a range of teaching materials that have been developed by members of the Q-Step Centre. If you have any questions, please contact l.brace@exeter.ac.uk or qstep@exeter.ac.uk. Details of Q-Step workshops and events can be found at https://socialsciences.exeter.ac.uk/q-step/events.
- Bug bounty reports that stand out, how to write one?
- Bug Bounty Report Templates by @ZephrFish
- Hacker101- Writing Good Reports
- List of Bug Bounty Platforms
- Bug Bounty Cheatsheet
- HOW TO GET STARTED IN BUG BOUNTY
back to Intro Page