Tuesday, May 30, 2023

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

Related posts


  1. Hacking Tools For Games
  2. Hacker Tools For Mac
  3. Hacking Tools For Games
  4. Pentest Tools
  5. Pentest Automation Tools
  6. Pentest Tools For Mac
  7. Hacking Tools Pc
  8. Best Pentesting Tools 2018
  9. Easy Hack Tools
  10. Pentest Automation Tools
  11. Hacks And Tools
  12. Install Pentest Tools Ubuntu
  13. Hack Tools For Ubuntu
  14. Pentest Tools Online
  15. Hacking Tools For Kali Linux
  16. Hacking Tools Software
  17. Hack Tools 2019
  18. Hacker Hardware Tools
  19. Hacker Tools Github
  20. What Are Hacking Tools
  21. Pentest Tools Website Vulnerability
  22. Hacking Tools And Software
  23. Pentest Tools Nmap
  24. Pentest Recon Tools
  25. Pentest Automation Tools
  26. Hacking Tools And Software
  27. Hack Tools For Pc
  28. Hack App
  29. What Is Hacking Tools
  30. Hacking Tools Github
  31. Hacking Tools Kit
  32. Pentest Tools
  33. Pentest Tools Nmap
  34. Hacking Tools 2019
  35. Hacking Tools Name
  36. Hacker Tools For Windows
  37. Hacking Tools Free Download
  38. Pentest Tools Apk
  39. Pentest Tools Linux
  40. World No 1 Hacker Software
  41. Pentest Tools Open Source
  42. Hack Tools Download
  43. Pentest Tools Windows
  44. Wifi Hacker Tools For Windows
  45. Pentest Tools Linux
  46. Blackhat Hacker Tools
  47. Hacker Tools Mac
  48. Hacking Tools Mac
  49. Hack Tools For Games
  50. Tools For Hacker
  51. Hacker Search Tools
  52. Hacking Tools For Windows Free Download
  53. Hacking Apps
  54. Hacking Tools Windows 10
  55. Hacker Tools
  56. Hacking Tools Windows
  57. Hacking Tools Name
  58. Hacking Tools Online
  59. Hack And Tools
  60. Hack Tools 2019
  61. Pentest Tools Website
  62. Hacks And Tools
  63. Pentest Tools For Windows
  64. Beginner Hacker Tools
  65. Hack Tool Apk No Root
  66. Pentest Reporting Tools
  67. Hacking Tools For Beginners
  68. World No 1 Hacker Software
  69. New Hack Tools
  70. Pentest Automation Tools
  71. Hacking Tools Online
  72. Pentest Tools Website
  73. What Is Hacking Tools
  74. Hacker Tools Github
  75. Hacker Tools Mac
  76. Pentest Tools Bluekeep
  77. Pentest Automation Tools
  78. Hacking Tools Windows 10
  79. Hacking Tools Online
  80. Hacker Tools For Ios
  81. Wifi Hacker Tools For Windows
  82. Kik Hack Tools
  83. Hacking Tools Github
  84. Hacker Tools List
  85. Beginner Hacker Tools
  86. Hacking Tools Hardware
  87. Pentest Tools Free
  88. Hack Apps

2020-12-13 SUNBURST SolarWinds Backdoor Samples

Reference

I am sure you all saw the news. 

Links updated: Jan 19, 2023


The Resurgence of Russian Threat Actor, NOBELIUM

 
Well, here are the Sunburst binaries. 
Here is a Sunburst malware analysis walk-through video by Colin Hardy




Hashes






SolarWinds.Orion.Core.BusinessLayer.dll


 Trojan:MSIL/Solorigate.B!dha
A Variant Of MSIL/SunBurst.A

SolarWinds.Orion.Core.BusinessLayer.dll
32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77
dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b
eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed
c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77
ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c
019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134
ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6
a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc
d3c6785e18fba3749fb785bc313cf8346182f532c59172b69adfb31b96a5d0af
0f5d7e6dfdd62c83eb096ba193b5ae394001bac036745495674156ead6557589
6e4050c6a2d2e5e49606d96dd2922da480f2e0c70082cc7e54449a7dc0d20f8d

CORE-2019.4.5220.20574-SolarWinds-Core-v2019.4.5220-Hotfix5.msp
d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600

appweblogoimagehandler.ashx.b6031896.dll
c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71

TEARDROP
b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07
1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c

RAINDROP
be9dbbec6937dfe0a652c0603d4972ba354e83c06b8397d6555fd1847da36725

This is the compromised installer file ( was still on Solarwinds update downloads  on Dec 14, 2020)

File size 419.76 MB
CoreInstaller.msi

ad2fbf4add71f61173975989d1a18395afb8538ed889012b9d2e21c19e98bbd1

2020-04-21 17:31:02
SolarWinds Orion Core Services 2020.2
{77E2D294-3D5C-4D93-ADF1-884CCEAD93B0}
File Version Information
Date signed 05:32 PM 04/21/2020
Signers
Solarwinds Worldwide, LLC
Symantec Class 3 SHA256 Code Signing CA
VeriSign
VT - 0 (Dec 14, 2020)

If you unzip, check 

SolarWinds.Orion.Core.BusinessLayer.dll under OrionCore







Related articles
  1. Beginner Hacker Tools
  2. How To Install Pentest Tools In Ubuntu
  3. Hacker Tools For Pc
  4. Hacking Tools Github
  5. Hacking Tools For Kali Linux
  6. Hacker Tools Hardware
  7. Hack Apps
  8. Hackrf Tools
  9. Pentest Tools Online
  10. Usb Pentest Tools
  11. How To Make Hacking Tools
  12. Pentest Recon Tools
  13. Pentest Tools Open Source
  14. Tools 4 Hack
  15. Hack Rom Tools
  16. Pentest Tools Nmap
  17. Hacking Tools Kit
  18. Hack Tools
  19. Hacker Tools Github
  20. Hack Rom Tools
  21. Hacker Tools Windows
  22. Hacking Tools Mac
  23. Hacker Tools Linux
  24. Hacker Tools Linux
  25. Best Hacking Tools 2019
  26. Hacking Tools Download
  27. Hacking Tools For Games
  28. Pentest Tools Free
  29. Hack Tools Mac
  30. Hack Tools Download
  31. Hacker Tools Mac
  32. How To Install Pentest Tools In Ubuntu
  33. Tools For Hacker
  34. Hacking Tools 2020
  35. Hacking Tools And Software
  36. Hack Tools
  37. Game Hacking
  38. Hack Tools Mac
  39. Hacking Tools For Mac
  40. Hacking Tools Mac
  41. Ethical Hacker Tools
  42. Hacking Tools And Software
  43. Hacker Tools List
  44. Hacker Tools 2019
  45. Underground Hacker Sites
  46. Pentest Tools Linux
  47. Ethical Hacker Tools
  48. Hacking Tools Name
  49. Best Hacking Tools 2020
  50. Hack Tool Apk
  51. Hacking Tools Hardware
  52. Pentest Tools Open Source
  53. Hacker Hardware Tools
  54. Hacker Tools Free
  55. Hack Tools For Ubuntu
  56. Pentest Tools Open Source
  57. Pentest Tools For Android
  58. Wifi Hacker Tools For Windows
  59. Pentest Tools Subdomain
  60. How To Hack
  61. New Hack Tools
  62. Hack Tools
  63. Hacker Tools Windows
  64. Hacker Search Tools
  65. Hacking Tools Software
  66. Hacking Tools Windows 10
  67. Hacker Tools Windows
  68. Android Hack Tools Github
  69. Pentest Tools Find Subdomains
  70. Pentest Tools Open Source
  71. Hack Website Online Tool
  72. Nsa Hacker Tools
  73. Kik Hack Tools
  74. Best Hacking Tools 2020
  75. Hacking Tools Name
  76. Hacking Tools For Windows 7
  77. Hacking App
  78. Wifi Hacker Tools For Windows
  79. Hacker Search Tools
  80. Hack Tools Download
  81. Pentest Tools For Windows
  82. Hack Tools Mac
  83. Hack Tools 2019
  84. Pentest Tools Github
  85. Ethical Hacker Tools
  86. Hack And Tools
  87. Hacker Tools Software
  88. Hack Tools Online
  89. Pentest Reporting Tools
  90. New Hack Tools
  91. Hack Rom Tools
  92. Hacker Hardware Tools
  93. Hack Tools Pc
  94. Pentest Tools Find Subdomains
  95. Hacking Tools Free Download
  96. Pentest Tools Github
  97. Nsa Hack Tools
  98. Hacking Tools Download
  99. New Hacker Tools
  100. Top Pentest Tools
  101. Hack Tools For Mac
  102. Pentest Tools Port Scanner
  103. Pentest Tools Github
  104. Physical Pentest Tools
  105. Computer Hacker
  106. Hacker Tools
  107. Hack Tools For Games
  108. Hacker Tools Mac
  109. Pentest Tools Bluekeep
  110. Blackhat Hacker Tools
  111. Usb Pentest Tools
  112. Hacker Security Tools
  113. Hacking Tools Name
  114. Hacking Tools For Windows 7
  115. Hacking Tools For Windows Free Download
  116. Pentest Tools Android
  117. Hak5 Tools
  118. How To Hack
  119. Pentest Tools Subdomain
  120. Hacking Tools Name
  121. Nsa Hack Tools Download
  122. Pentest Tools Website
  123. Install Pentest Tools Ubuntu
  124. Hacker Tools Windows
  125. Pentest Tools Review
  126. Hacker Tools For Mac
  127. Hack Rom Tools
  128. Pentest Tools Alternative
  129. Pentest Tools Framework
  130. Hacking Tools Usb
  131. Free Pentest Tools For Windows
  132. Hacker Tools List
  133. Pentest Tools Framework
  134. Pentest Tools Windows
  135. Hack Tools For Windows
  136. Pentest Tools For Mac
  137. Hack Tools For Games
  138. Hacking Tools Usb
  139. Ethical Hacker Tools
  140. Hack Tools Mac