Panduan lengkap dari nol sampai bisa hunting bug dan submit ke program bug bounty. Ikuti phase secara berurutan untuk hasil terbaik.
Request/response, headers, cookies, sessions, status codes
DOM manipulation, form handling, client-side logic
DNS, TCP/IP, ports, subnets, proxies
File system, permissions, bash scripting, SSH
Frontend vs backend, APIs, databases, authentication flow
Subfinder, Amass, crt.sh, brute-forcing subdomains
Nmap, Masscan, identifying running services
Dirsearch, Gobuster, ffuf, wordlist selection
Wappalyzer, WhatWeb, identifying CMS and frameworks
Advanced search operators, Shodan, Censys, archived pages
Finding endpoints, API keys, and secrets in JS files
Reflected, Stored, DOM-based XSS, filter bypass, CSP bypass
Union-based, blind, time-based, error-based, second-order SQLi
Internal service access, cloud metadata, protocol smuggling
Broken access control, horizontal/vertical privilege escalation
Broken auth, JWT attacks, OAuth misconfigurations, 2FA bypass
Token bypass, SameSite cookies, clickjacking chains
Extension bypass, content-type tricks, webshell upload
TOCTOU bugs, limit bypass, double-spending in web apps
Java, PHP, Python deserialization, gadget chains
Jinja2, Twig, Freemarker, server-side template exploitation
Introspection, batching, injection, authorization bypass
REST/GraphQL fuzzing, broken object-level authorization (BOLA)
Price manipulation, coupon abuse, workflow bypass
Dangling DNS records, cloud service takeover
Clear title, reproduction steps, impact assessment, PoC
HackerOne, Bugcrowd, Intigriti, YesWeHack, program selection
Understanding critical/high/medium/low, CVSS calculator
Ethics, rules of engagement, legal considerations
Blog writeups, CVEs, public disclosures, building reputation