skip to Main Content

Topic: Bug Hunter Methodology

Advice From A Researcher: How To Approach A Target

Editor’s Note: Today I’d like to introduce you to Bugcrowd member Anshuman Bhartiya (anshuman_bh). As an information security professional as well as bug bounty researcher, Anshuman has helped improve the security of many organizations. He has submitted several P1 & P2 bugs leading to his high standing within the programs he is involved in. As an active member on our Bugcrowd forum he also contributes to the bug bounty researcher community. This blog is from one of his responses on the forum that he has allowed us to post here. We are thrilled to share his thoughts and experience on how to successfully approach a target. Thanks!

Read More

Advice From A Researcher: Hunting XXE For Fun and Profit

About the Author: Ben Sadeghipour has been participating in bug bounty programs since February of 2014. After his first few bugs, he came to realize that bug bounties are a great way to learn more about web application security as well as make some extra money while going to school – computer science major. Currently Ben is an intern at Bugcrowd and continues to do bug bounty research. You can see more of his work on nahamsec.com.

Read More

Adventures in Reverse Engineering

One thing we like to highlight at Bugcrowd is creating lasting positive relationships between clients and talented researchers. Today one of our crowd, Duarte Silva, released some of his work on reverse engineering Aruba Networks ArubaOS Firmware package. Some time…

Read More

Guest Blog: Writing Up a POC by Planet Zuda

Republished with permission from: http://planetzuda.com/2014/12/29/how-to-write-a-good-proof-of-concept-for-security-holes/ How To Write a Proof Of Concept For Security Holes December 29, 2014 by Planet Zuda   We find security bugs all the time and have to write proof of concepts. Unfortunately, we struggled with being able to…

Read More
Learn More About The Most Critical Vulnerabilities of 2019Download Report
+
Back To Top