Bug Bounty Hunting & Reporting Introduction

Profile photo for Pratik Yadav
Not Yet Rated
0:00
Elearning
5
0

Description

This is the basic introduction for bug bounty hunting and reporting, the sample is the 1st cover of the course.

Vocal Characteristics

Language

English

Voice Age

Young Adult (18-35)

Accents

British (General) Indian (General)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
welcome everyone to the scores on bug Bounty hunting on reporting Congratulations. It's very exciting that you have decided to dive into cybersecurity and pick up some new skills. We've collected several resources in the scores that will help you get started. A bug bounty programme is a deal offered by many Web sites such as Facebook, BDM E Vest, you're Amy and software developers, by which individuals can receive recognition on compensation for reporting bugs especially pertaining to exploits on vulnerabilities. While you learn the techniques off bug bounty, it's important to make sure that you're also understanding on retaining what you learn. Practising on vulnerable applications and systems is a great way to test your skills in simulated environments. Once you get a baseline understanding ofthe howto find and exploit security vulnerabilities, it's time to start checking out what other hackers are finding in the wind. That is. You read deck write ups on posies, which are proof ofthe concepts from other hackers On. Equally important part is so sequentially, report one abilities in order to get the bounty. These will give you an idea off what you're running up against in the real world. Having introduced you to the topic off this session. Let me now tell you what the scores is going to be about. The programme is going to help you not only understand how to perform bug bounty hunting, but also to do reporting as well. Let's now get familiar with the table of contents, which you're going to see in this course. So first we would be covering bug bounty hunting, followed by platforms for bug bounty hunting. Very. We will learn about the different platforms on which bug bounty hunting can be performed, followed by the tools that are required for bug bounty hunting, the methodologies that include while bug bounty hunting along with how to report bugs in an appropriate manner. So let's begin with the session.