How to Write Great Bug Bounty Reports

  Рет қаралды 18,900

The Cyber Mentor

The Cyber Mentor

Күн бұрын

Пікірлер: 19
@AlecMaly
@AlecMaly Жыл бұрын
Report writing is a fine art, especially for bug bounty. Report just good enough to get paid, but vague enough that the implemented fix can be bypassed so you can farm the same bug for multiple bounties. 😂
@dushanmalinga6268
@dushanmalinga6268 9 ай бұрын
do you have any written bug bounty report
@markfuentes3666
@markfuentes3666 Жыл бұрын
this is exactly what I have been waiting for. Thank you Heath!!!!😀
@BibleOSINT
@BibleOSINT Жыл бұрын
Nice video, thank you! But when is the best time to start bug bounty hunting?
@melegritojoel
@melegritojoel Жыл бұрын
nice work man ❤❤❤
@_FudgeSupreme
@_FudgeSupreme Жыл бұрын
Nice Video Mate ❤❤❤
@juliusrowe9374
@juliusrowe9374 Жыл бұрын
Great tutori8al Heath!
@Did_Diggie_Die_Yet
@Did_Diggie_Die_Yet Жыл бұрын
I know nothing about coding or hacking or ANYTHING, but I really want to learn- even just the basics would be cool. Do you know a good starting point or what I should do to set a foundation for building my knowledge on the subject?
@Ectokin
@Ectokin Жыл бұрын
What tools do you like to use for note taking / documentation?
@youcef2851
@youcef2851 Жыл бұрын
thank you heath
@mianhussnainjaved7313
@mianhussnainjaved7313 Жыл бұрын
Just asking what if some comments and low severity vulnerabilities able to fetch the database where one can access admin account without changing the password, are those vulnerabilities will stay in low severity or we should set them as critical?
@cyberdark8082
@cyberdark8082 Жыл бұрын
From my point of view, regardless of whether a tool tells you that you have something critical, it would be necessary to see if that asset is critical for the organization as such. But going back to what you indicate, I believe that something considered as disclosure of weak credentials or passwords must be approached with the same implication that it deserves. Since it carries an even greater risk.
@ankitchoudhury9678
@ankitchoudhury9678 3 ай бұрын
what to do if there is no bug bounty program but there is a vulnerability in the website I'm using
@mekdadpdiop5764
@mekdadpdiop5764 Жыл бұрын
nice
@antonioavilashiraz
@antonioavilashiraz Жыл бұрын
MMMM. I will start your courses today. I just want to start with your courses. Not proffessor messer etc. just remind me how to start> thank you
@mohammadh8032
@mohammadh8032 2 ай бұрын
@AG-ur1lj
@AG-ur1lj 5 ай бұрын
Scope is negotiable-but you do need to actually negotiate. That means NOT submitting a report through their bounty program. If you find something out of scope that is actually something, you should reach out directly to the company. Be considerate, and there’s a decent chance of negotiating payment-assuming you really did _find something_
@SY_KURD
@SY_KURD Жыл бұрын
First
@racerx1777
@racerx1777 Жыл бұрын
Dude! Who are these other people on this channel? Not really liking that
Practical Bug Bounty
4:45:52
The Cyber Mentor
Рет қаралды 122 М.
How I Choose Bug Bounty Targets
6:30
Ryan John
Рет қаралды 16 М.
УЛИЧНЫЕ МУЗЫКАНТЫ В СОЧИ 🤘🏻
0:33
РОК ЗАВОД
Рет қаралды 7 МЛН
ССЫЛКА НА ИГРУ В КОММЕНТАХ #shorts
0:36
Паша Осадчий
Рет қаралды 8 МЛН
This video is NOT a Simplex Maximization (read bio)
3:29
Economattias
Рет қаралды 4
Our Best Bug Bounty Tips
8:03
The Cyber Mentor
Рет қаралды 7 М.
How to Be an Ethical Hacker in 2025
45:59
The Cyber Mentor
Рет қаралды 75 М.
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
26:37
David Bombal
Рет қаралды 75 М.
How I Found My First Bug (now you can too)
9:33
The Cyber Mentor
Рет қаралды 79 М.
How To Write A Pentest Report That Gets Your Findings Fixed
20:30
УЛИЧНЫЕ МУЗЫКАНТЫ В СОЧИ 🤘🏻
0:33
РОК ЗАВОД
Рет қаралды 7 МЛН