0% found this document useful (0 votes)
47 views11 pages

Bug Bounty Checklist

Uploaded by

doon.aryan2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views11 pages

Bug Bounty Checklist

Uploaded by

doon.aryan2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

🆓 Bug Bounty Checklist & Recon Template

The complete free resource mentioned in the video - everything you need to structure your
workflow and turn chaos into strategy

🎯 Pre-Hunt Preparation Checklist


✅ Program Research
Read program rules completely (twice!)
Identify in-scope assets and domains
Note out-of-scope restrictions
Check forbidden endpoints/actions
Understand acceptable testing methods
Review past disclosed reports for patterns
Join program's communication channels
Set up proper testing environment

✅ Tool Preparation
Burp Suite configured and ready
Custom wordlists prepared
VPN/proxy setup verified
Screenshot tools ready
Note-taking system established
Backup documentation method ready

🔍 Systematic Recon Template


Phase 1: Information Gathering 🕵️

Subdomain Discovery

Certificate transparency logs (crt.sh)


DNS brute forcing with quality wordlists
Search engine dorking ( site:target.com )
GitHub/GitLab repository searches
Social media and public documents
Third-party service integrations
Historical DNS data (SecurityTrails, etc.)

Documentation Template:

Target: [TARGET_NAME]
Date: [DATE]

Subdomains Found:
- subdomain1.target.com [STATUS_CODE]
- subdomain2.target.com [STATUS_CODE]

Interesting Findings:
-

Port & Service Enumeration

Nmap comprehensive scan


Service version identification
Banner grabbing
SSL/TLS configuration review
Uncommon port discovery
Service-specific vulnerability checks

Documentation Template:

Port Scan Results:


- Port 80: HTTP [Server Info]
- Port 443: HTTPS [SSL Details]
- Port 8080: HTTP [Additional Service]

Service Versions:
-

Security Observations:
-

Phase 2: Web Application Analysis 🌐

Technology Stack Identification

HTTP response headers analysis


JavaScript framework detection
CMS/platform identification (Wappalyzer)
Third-party service integration mapping
CDN and hosting provider identification
Database technology indicators
Technology Stack Template:

Web Server: [Apache/Nginx/IIS]


Framework: [React/Angular/Vue/PHP/etc.]
CMS: [WordPress/Drupal/Custom]
Database: [MySQL/PostgreSQL/MongoDB]
CDN: [Cloudflare/AWS/etc.]
Security: [WAF detected/Headers present]

Interesting Technologies:
-

Content Discovery

Directory brute forcing (common paths)


File extension discovery
Backup file hunting (.bak, .old, .tmp)
Configuration file searches
API endpoint discovery
Admin panel location
Development/staging environment detection

Content Discovery Template:

Directories Found:
- /admin [STATUS] - [DESCRIPTION]
- /api [STATUS] - [DESCRIPTION]
- /backup [STATUS] - [DESCRIPTION]

Files of Interest:
- /robots.txt - [FINDINGS]
- /sitemap.xml - [ENDPOINTS]
- /.env - [ACCESSIBLE Y/N]

API Endpoints:
- /api/v1/users
- /api/v1/auth

Phase 3: Parameter Discovery 🔗

Parameter Enumeration

URL parameter discovery


POST parameter identification
Hidden form field analysis
Cookie parameter review
Header parameter testing
JSON/API parameter mapping

Parameter Template:

GET Parameters:
- id: [INTEGER] - User/object identifier
- search: [STRING] - Search functionality
- redirect: [URL] - Redirect parameter

POST Parameters:
- username: [STRING]
- password: [STRING]
- csrf_token: [TOKEN]

Interesting Parameters:
- debug: [BOOLEAN] - Debug mode toggle
- admin: [BOOLEAN] - Admin access flag

Phase 4: Vulnerability Assessment 🔓

Input Validation Testing

Cross-Site Scripting (XSS)


Reflected XSS in parameters
Stored XSS in user inputs
DOM-based XSS
SQL Injection
Error-based injection
Boolean-based blind injection
Time-based blind injection
Command Injection
Path Traversal
File Upload vulnerabilities
XXE (XML External Entity)

Authentication & Session Management

Weak password policies


Session fixation
Session hijacking possibilities
Brute force protection
Password reset vulnerabilities
Multi-factor authentication bypass
Business Logic Testing

Race conditions
Price manipulation
Privilege escalation
Workflow bypass
Rate limiting bypass
Payment processing flaws

Vulnerability Testing Template:

Vulnerability: [TYPE]
Location: [URL/PARAMETER]
Method: [GET/POST/etc.]
Payload: [PAYLOAD_USED]
Response: [INTERESTING_RESPONSE]
Impact: [BUSINESS_IMPACT]
Reproducible: [Y/N]

Test Results:
✅ - Vulnerable
❌ - Not vulnerable
⚠️ - Needs more testing

📊 Finding Documentation System


Critical Finding Template 🔴

=== CRITICAL VULNERABILITY ===


Title: [CLEAR_TITLE]
Asset: [EXACT_URL]
Type: [VULN_TYPE]
Discovered: [DATE_TIME]

Impact:
- Immediate business risk
- Data exposure potential
- System compromise possible

Reproduction Steps:
1. Navigate to [URL]
2. [EXACT_STEPS]
3. Observe [RESULT]

Evidence:
- Screenshot: [FILENAME]
- Request/Response: [DETAILS]
- Video: [IF_APPLICABLE]

Business Impact:
[WHY_THIS_MATTERS_TO_BUSINESS]

Standard Finding Template 📝

Title: [VULNERABILITY_NAME]
Severity: [CRITICAL/HIGH/MEDIUM/LOW]
Asset: [AFFECTED_URL]
Parameter: [VULNERABLE_PARAMETER]

Description:
[TECHNICAL_DESCRIPTION]

Steps to Reproduce:
1.
2.
3.

Expected Result:
[WHAT_SHOULD_HAPPEN]

Actual Result:
[WHAT_ACTUALLY_HAPPENS]

Impact:
[SECURITY_IMPLICATIONS]

Remediation:
[SUGGESTED_FIX]

🗓️ Organized Workflow Schedule


Daily Bug Hunting Routine

Morning Setup (30 mins):


- [ ] Review active targets
- [ ] Check for program updates
- [ ] Plan today's focus area
- [ ] Set up testing environment

Core Hunting (4-6 hours):


- [ ] 1 hour: Automated recon
- [ ] 2-3 hours: Manual testing
- [ ] 1 hour: Deep dive on interesting findings
- [ ] 1 hour: Documentation and reporting

Evening Wrap-up (30 mins):


- [ ] Document all findings
- [ ] Update progress checklist
- [ ] Plan tomorrow's priorities
- [ ] Back up important data

Weekly Review Process

Every Sunday:
- [ ] Review all findings from the week
- [ ] Analyze what worked vs. what didn't
- [ ] Update methodology based on learnings
- [ ] Plan upcoming week's targets
- [ ] Clean up workspace and files
- [ ] Research new techniques/tools

🎯 Target Priority Matrix


High Priority Targets 🚀

Recently launched features


User input handling areas
Authentication mechanisms
File upload functionality
API endpoints
Admin panels

Medium Priority Targets ⚡

Static content areas


Information disclosure points
Configuration files
Error page analysis
Third-party integrations

Low Priority Areas 📋

Public marketing pages


Static documentation
Already well-tested components
Out-of-scope adjacent areas

🔄 Failure Analysis Framework


Common Failure Patterns ❌

Recon Failures

Missed obvious subdomains


Ignored certificate transparency
Skipped GitHub reconnaissance
Overlooked API documentation
Didn't check for mobile apps

Testing Failures

Tested same injection repeatedly


Ignored encoding/filtering
Missed context-specific payloads
Didn't consider application logic
Forgot about different HTTP methods

Documentation Failures

Poor screenshot quality


Missing reproduction steps
Unclear impact explanation
No business context provided
Disorganized evidence

Learning Template

Date: [DATE]
Target: [TARGET]
What Failed: [SPECIFIC_FAILURE]
Why It Failed: [ROOT_CAUSE]
Lesson Learned: [KEY_INSIGHT]
Prevention Strategy: [HOW_TO_AVOID]

📚 Manual Mode Workflow


This is "manual mode" - it works, but requires discipline and organization
1. Setup Your Workspace 📁

Create this folder structure:

BugBounty_Workspace/
├── Active_Targets/
├── Completed_Targets/
├── Templates/
├── Tools_and_Scripts/
├── Learning_Notes/
└── Reports_Ready/

2. Use Physical/Digital Notebooks 📝

Keep a master target list


Maintain daily hunting logs
Track methodology improvements
Record interesting techniques found

3. Follow the Checklists ✅

Print out recon checklist


Use finding templates consistently
Follow systematic workflow
Don't skip documentation steps

4. Time Management ⏰

Set specific time blocks for each phase


Use pomodoro technique for focus
Don't get lost in rabbit holes
Regular progress reviews

🌟 Success Transformation
From Beginner Chaos 😵

Random scanning hoping for magic


Notes scattered everywhere
Forgetting what you've tested
Reporting out-of-scope findings
Getting lost in recon forever

To Professional Hunter 🎯
Systematic approach with clear priorities
Organized documentation and evidence
Understanding of application logic
Clean, professional reports
Efficient workflow that scales

💡 Community Integration Tips


Learning Acceleration 🚀

Join bug bounty Discord servers


Follow successful hunters on Twitter
Read disclosed reports religiously
Participate in CTFs and practice labs
Share knowledge and ask questions

Networking Strategy 🤝

Contribute to community discussions


Share interesting techniques (responsibly)
Help newcomers when you can
Build relationships with other hunters
Stay updated on new methodologies

🎖️ Final Success Framework


The Mindset Shift 🧠

1. Think Like the Application - Ask "Where would I screw up?"


2. Embrace Failure - Every failed payload teaches something
3. Prioritize Impact - Focus on what matters to the business
4. Document Everything - Your future self will thank you
5. Stay Systematic - Chaos kills productivity

Key Success Metrics 📊

Time from recon to first finding


Report acceptance rate
Severity distribution of findings
Learning velocity and skill growth
Community engagement and reputation

Remember: This free template gives you the structure and systematic approach. The
difference between finding nothing and finding critical bugs often comes down to
organization, patience, and following a proven methodology.

Start here, master the basics, then level up! 🚀

You might also like