SlideShare a Scribd company logo
6
Most read
8
Most read
17
Most read
ABCD of Bug
bounty
Appsec Engineer
Inmagine Group
Md Atikqur Rahman
Target Audience
Table of Contents
What is a bug bounty Learning path for
fresher
Start Practicing Bug Bounty
Platforms
01 02
03 04
What is bug bounty?
01
Bug = error, flaw or fault
Bounties = gift,rewards, prize
“An individual who report security bugs/flaws/vulnerabilities in an organization
product(website, app, device) and in return receive rewards or compensation”
What is bug bounty
programs?
“Companies that invite researchers and
provide legal permission to find security
flaws in their products”
Why Bug Bounty needed?
• Every pair of eyes are different. Simple
out-of-the-box thinking can discover
critical bugs which no one ever noticed
for decades.
• No matter how thoroughly the
organization documents software
requirements and specifications or how
well the product is designed and coded,
there will always be defects. Whether
minor nuisances or major concerns, bugs
will find a way to infiltrate a product.
Learning path
for freshers
02
required things before start learning
1. Learn Some Web Technologies
- Html, Javascript
- HTTP, HTTPS, SSL
2. At least one programming language
- python
- Bash
3. Make a habit of reading blogs
4. Patience
Learning platforms
Ask the bug
SQL Injection
What
Why
How
Start Practicing
03
Start Practicing
1. Learn and Solve minimum one
challenge a day.
2. Spent some time to research
about a bug.
3. Find blogs to read about
Bug Bounty Platforms
04
Bug Bounty Platforms
CREDITS: This presentation template was created by Slidesgo,
including icons by Flaticon, infographics & images by Freepik
Thanks!
Do you have any
questions?

More Related Content

PPTX
Bug Bounty 101
Shahee Mirza
 
PDF
Bug Bounty Basics
HackerOne
 
PDF
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
PPTX
Network security # Lecture 1
Kabul Education University
 
PDF
Bug Bounty Blueprint : A Beginner's Guide
Varun Mithran
 
PPT
Basic Concepts of information security.ppt
Zaheer720515
 
PDF
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
Varun Mithran
 
Bug Bounty 101
Shahee Mirza
 
Bug Bounty Basics
HackerOne
 
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
Network security # Lecture 1
Kabul Education University
 
Bug Bounty Blueprint : A Beginner's Guide
Varun Mithran
 
Basic Concepts of information security.ppt
Zaheer720515
 
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
Varun Mithran
 

What's hot (20)

PDF
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
Frans Rosén
 
PDF
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd
 
PDF
DNS hijacking using cloud providers – No verification needed
Frans Rosén
 
PDF
Bug Bounty - Hackers Job
Arbin Godar
 
PPTX
Bug Bounty for - Beginners
Himanshu Kumar Das
 
PPTX
Bug Bounty - Play For Money
Shubham Gupta
 
PPTX
Bug Bounty #Defconlucknow2016
Shubham Gupta
 
PPTX
Waf bypassing Techniques
Avinash Thapa
 
PDF
Bug bounty null_owasp_2k17
Sagar M Parmar
 
PPTX
Recon like a pro
Nirmalthapa24
 
PPTX
Understanding Cross-site Request Forgery
Daniel Miessler
 
PDF
REST API Pentester's perspective
SecuRing
 
PPTX
Attacking thru HTTP Host header
Sergey Belov
 
PPTX
Everything about Blind xss
Md Atikqur Rahman
 
PDF
OWASP Top 10 Web Application Vulnerabilities
Software Guru
 
PPTX
Saying Hello to Bug Bounty
Null Bhubaneswar
 
PPTX
Authentication and Authorization in Asp.Net
Shivanand Arur
 
PDF
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 
PPTX
Web application security
Kapil Sharma
 
PPTX
SSRF For Bug Bounties
OWASP Nagpur
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
Frans Rosén
 
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd
 
DNS hijacking using cloud providers – No verification needed
Frans Rosén
 
Bug Bounty - Hackers Job
Arbin Godar
 
Bug Bounty for - Beginners
Himanshu Kumar Das
 
Bug Bounty - Play For Money
Shubham Gupta
 
Bug Bounty #Defconlucknow2016
Shubham Gupta
 
Waf bypassing Techniques
Avinash Thapa
 
Bug bounty null_owasp_2k17
Sagar M Parmar
 
Recon like a pro
Nirmalthapa24
 
Understanding Cross-site Request Forgery
Daniel Miessler
 
REST API Pentester's perspective
SecuRing
 
Attacking thru HTTP Host header
Sergey Belov
 
Everything about Blind xss
Md Atikqur Rahman
 
OWASP Top 10 Web Application Vulnerabilities
Software Guru
 
Saying Hello to Bug Bounty
Null Bhubaneswar
 
Authentication and Authorization in Asp.Net
Shivanand Arur
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 
Web application security
Kapil Sharma
 
SSRF For Bug Bounties
OWASP Nagpur
 
Ad

Similar to ABCD of Bugbounty.pptx (20)

PPTX
Web Application Security And Getting Into Bug Bounties
kunwaratul hax0r
 
PPTX
Basics of getting Into Bug Bounty Hunting
Muhammad Khizer Javed
 
PPTX
Getting_Started_with_Bug_Bounty program.
glcrushgaming
 
PDF
Yet another talk on bug bounty
vinoth kumar
 
PDF
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Mazin Ahmed
 
PDF
Hunting bugs - C0r0n4con
Anchises Moraes
 
PPTX
LKNOG3 - Bug Bounty
LKNOG
 
PDF
Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at Hack...
HackenProof
 
PDF
Bug Bounty Career.pdf
Vishal318796
 
PDF
[Webinar] The Art & Value of Bug Bounty Programs
bugcrowd
 
PDF
Owasp LA
leifdreizler
 
PPTX
7 Bug Bounty Myths, BUSTED
bugcrowd
 
PDF
Bug Bounties and The Path to Secure Software by 451 Research
HackerOne
 
PPTX
Bug bounty programs
Yassine Aboukir
 
PPTX
Bug bounty
Ramin Farajpour Cami
 
PPTX
Bug Bounty
Hariprasad KA
 
PPTX
Bug bounty hunting
redteamacademypromo
 
DOCX
Earn Money from bug bounty
Jay Nagar
 
PDF
Webinar kym-casey-bug bounty tipping point webcast - po edits
Casey Ellis
 
PDF
Bug Bounty Tipping Point: Strength in Numbers
bugcrowd
 
Web Application Security And Getting Into Bug Bounties
kunwaratul hax0r
 
Basics of getting Into Bug Bounty Hunting
Muhammad Khizer Javed
 
Getting_Started_with_Bug_Bounty program.
glcrushgaming
 
Yet another talk on bug bounty
vinoth kumar
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Mazin Ahmed
 
Hunting bugs - C0r0n4con
Anchises Moraes
 
LKNOG3 - Bug Bounty
LKNOG
 
Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at Hack...
HackenProof
 
Bug Bounty Career.pdf
Vishal318796
 
[Webinar] The Art & Value of Bug Bounty Programs
bugcrowd
 
Owasp LA
leifdreizler
 
7 Bug Bounty Myths, BUSTED
bugcrowd
 
Bug Bounties and The Path to Secure Software by 451 Research
HackerOne
 
Bug bounty programs
Yassine Aboukir
 
Bug Bounty
Hariprasad KA
 
Bug bounty hunting
redteamacademypromo
 
Earn Money from bug bounty
Jay Nagar
 
Webinar kym-casey-bug bounty tipping point webcast - po edits
Casey Ellis
 
Bug Bounty Tipping Point: Strength in Numbers
bugcrowd
 
Ad

Recently uploaded (20)

PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PPTX
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PPTX
ternal cell structure: leadership, steering
hodeeesite4
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
EE3303-EM-I 25.7.25 electrical machines.pptx
Nagen87
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Hyogeun Oh
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
Ppt for engineering students application on field effect
lakshmi.ec
 
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Introduction to Data Science: data science process
ShivarkarSandip
 
ternal cell structure: leadership, steering
hodeeesite4
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
EE3303-EM-I 25.7.25 electrical machines.pptx
Nagen87
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Hyogeun Oh
 

ABCD of Bugbounty.pptx