Skip to content

byoniq/BugBountyMethod

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

Bug Bounty Methodology Checklist

This repository contains a comprehensive methodology and checklist for bug bounty hunting, covering recon, enumeration, and exploitation techniques. It is designed to assist security researchers and penetration testers in systematically identifying vulnerabilities in web applications, networks, and infrastructure.

Table of Contents

  1. Recon Phase
  2. Network Recon
  3. User Management
  4. Session Management
  5. Input Handling
  6. Error Handling
  7. Application Logic
  8. Other Checks

Recon Phase

Large Scope: Company with Multiple Domains

Medium Scope: Single Domain

Small Scope: Single Website

  • Identify web server and tech stack:
  • Locate common files like /robots.txt, /sitemap.xml, etc.
  • Source code review (using comments):
    • Burp Suite Engagement Tools
  • Directory enumeration:
  • Web fuzzing:
  • Discover URLs and APIs:
  • Test CORS vulnerabilities:

Network Recon


User Management

Registration

  • Test for duplicate registrations (e.g., user+1@mail.com)
  • Check for weak password policies
  • Rate-limiting on registration

Authentication

  • Test username enumeration
  • Test for brute-force resilience
  • Test multi-stage authentication (OAuth, SAML, JWT)

Session Management

  • Test session fixation
  • Test CSRF tokens
  • Validate secure cookies (HTTPOnly, Secure)
  • Check session expiration on logout

Input Handling

  • Test for Reflected XSS:
  • Test for SQL Injection:
  • Test for Server-Side Request Forgery (SSRF):
  • Test for Local File Inclusion (LFI)

Error Handling

  • Generate and analyze custom error pages
  • Test HTTP header injection
  • Use fuzzing techniques to generate error codes:

Application Logic

  • Test for multi-step process logic flaws (e.g., gift codes, payments)
  • Test for client-side validation bypass
  • IDOR checks (access control for sensitive resources)

Other Checks

CAPTCHA Bypass

Security Headers

  • Check for missing headers like:
    • X-XSS-Protection, Strict-Transport-Security, Content-Security-Policy, X-Frame-Options

Contributing

Feel free to submit a pull request if you find additional tools, techniques, or methodologies that should be included. We welcome all contributions from the bug bounty community!


This checklist provides a systematic approach to finding and exploiting vulnerabilities in bug bounty programs. It serves as a quick reference to ensure you cover all critical aspects during your testing process.

About

Bug Bounty Methodology

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors