How to Write Great Bug Bounty Reports

  Рет қаралды 15,807

The Cyber Mentor

The Cyber Mentor

Жыл бұрын

Pentests & Security Consulting: tcm-sec.com
Get Trained: academy.tcm-sec.com
Get Certified: certifications.tcm-sec.com
Merch: merch.tcm-sec.com
Sponsorship Inquiries: info@thecybermentor.com
📱Social Media📱
___________________________________________
Twitter: / thecybermentor
Twitch: / thecybermentor
Instagram: / thecybermentor
LinkedIn: / heathadams
TikTok: / thecybermentor
Discord: / discord
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
/ thecybermentor
Support the stream (one-time): streamlabs.com/thecybermentor
Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
The Hacker Playbook 3: amzn.to/34XkIY2
Hacking: The Art of Exploitation: amzn.to/2VchDyL
The Web Application Hacker's Handbook: amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
Linux Basics for Hackers: amzn.to/34WvcXP
Python Crash Course, 2nd Edition: amzn.to/30gINu0
Violent Python: amzn.to/2QoGoJn
Black Hat Python: amzn.to/2V9GpQk
My Build:
lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
EVGA 2080TI: amzn.to/30d2lj7
MSI Z390 MotherBoard: amzn.to/30eu5TL
Intel 9700K: amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
Razer Nommo Chroma Speakers: amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
My Recording Equipment:
Panasonic G85 4K Camera: amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: amzn.to/2LIRxAp
Aston Origin Microphone: amzn.to/2LFtNNE
Rode VideoMicro: amzn.to/309yLKH
Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
Elgato Cam Link 4K: amzn.to/2QlicYx
Elgate Stream Deck: amzn.to/2OlchA5
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

Пікірлер: 20
@AlecMaly
@AlecMaly Жыл бұрын
Report writing is a fine art, especially for bug bounty. Report just good enough to get paid, but vague enough that the implemented fix can be bypassed so you can farm the same bug for multiple bounties. 😂
@dushanmalinga6268
@dushanmalinga6268 3 ай бұрын
do you have any written bug bounty report
@markfuentes3666
@markfuentes3666 Жыл бұрын
this is exactly what I have been waiting for. Thank you Heath!!!!😀
@Zen_Monkey
@Zen_Monkey Жыл бұрын
Hope this is being put out since you're working on a Bug Bounty Course!
@JoeHellethemayor
@JoeHellethemayor Жыл бұрын
It's because we get a lot of bad bug bounty reports in our VDP program.
@Zen_Monkey
@Zen_Monkey Жыл бұрын
@@JoeHellethemayor That was option #2 for me, lol
@melegritojoel
@melegritojoel Жыл бұрын
nice work man ❤❤❤
@juliusrowe9374
@juliusrowe9374 Жыл бұрын
Great tutori8al Heath!
@_FudgeSupreme
@_FudgeSupreme Жыл бұрын
Nice Video Mate ❤❤❤
@ForGivennnnn
@ForGivennnnn Жыл бұрын
Nice video, thank you! But when is the best time to start bug bounty hunting?
@youcef2851
@youcef2851 Жыл бұрын
thank you heath
@maheshsanga8301
@maheshsanga8301 Жыл бұрын
Big fan sir❤
@Ectokin
@Ectokin Жыл бұрын
What tools do you like to use for note taking / documentation?
@Did_Diggie_Die_Yet
@Did_Diggie_Die_Yet Жыл бұрын
I know nothing about coding or hacking or ANYTHING, but I really want to learn- even just the basics would be cool. Do you know a good starting point or what I should do to set a foundation for building my knowledge on the subject?
@mekdadpdiop5764
@mekdadpdiop5764 Жыл бұрын
nice
@mianhussnainjaved7313
@mianhussnainjaved7313 Жыл бұрын
Just asking what if some comments and low severity vulnerabilities able to fetch the database where one can access admin account without changing the password, are those vulnerabilities will stay in low severity or we should set them as critical?
@cyberdark8082
@cyberdark8082 Жыл бұрын
From my point of view, regardless of whether a tool tells you that you have something critical, it would be necessary to see if that asset is critical for the organization as such. But going back to what you indicate, I believe that something considered as disclosure of weak credentials or passwords must be approached with the same implication that it deserves. Since it carries an even greater risk.
@antonioavilashiraz
@antonioavilashiraz Жыл бұрын
MMMM. I will start your courses today. I just want to start with your courses. Not proffessor messer etc. just remind me how to start> thank you
@SY_KURD
@SY_KURD Жыл бұрын
First
@racerx1777
@racerx1777 Жыл бұрын
Dude! Who are these other people on this channel? Not really liking that
the CHEAPEST path to becoming an ethical hacker
17:14
The Cyber Mentor
Рет қаралды 74 М.
Easy $500 Vulnerabilities! // How To Bug Bounty
13:19
NahamSec
Рет қаралды 67 М.
Получилось у Миланы?😂
00:13
ХАБИБ
Рет қаралды 5 МЛН
Why Is He Unhappy…?
00:26
Alan Chikin Chow
Рет қаралды 68 МЛН
IQ Level: 10000
00:10
Younes Zarou
Рет қаралды 11 МЛН
Directory Traversal attacks are scary easy
9:41
The Cyber Mentor
Рет қаралды 19 М.
How to hack WordPress?
21:08
Bug Bounty Reports Explained
Рет қаралды 9 М.
Practical Bug Bounty
4:45:52
The Cyber Mentor
Рет қаралды 77 М.
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
26:37
David Bombal
Рет қаралды 72 М.
What is the BEST Hacking Platform?
9:30
The Cyber Mentor
Рет қаралды 35 М.
"Easiest" Beginner Bugs? Access Control and IDORs
31:46
InsiderPhD
Рет қаралды 19 М.
Todos os modelos de smartphone
0:20
Spider Slack
Рет қаралды 65 МЛН
Look, this is the 97th generation of the phone?
0:13
Edcers
Рет қаралды 8 МЛН
КРУТОЙ ТЕЛЕФОН
0:16
KINO KAIF
Рет қаралды 7 МЛН