πŸ“›
Cybersecurity
search
Ctrlk
  • Init
  • 🐞Bug Bounty Hunting
    • Basics
    • Tips
    • Tools
    • Articles
    • Talks Summarized
  • πŸ“‘Certifications
    • eJPT
  • πŸš€Web3 Sec
    • Web3 Basics
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🐞Bug Bounty Hunting

Basics

First things first

Fundaments : Understanding the Internet

  1. Understanding the Model: https://twitter.com/thebinarybot/status/1562054331859345410arrow-up-right

  2. DNS: https://twitter.com/thebinarybot/status/1562431068376276992arrow-up-right

  3. DNS Records: https://twitter.com/thebinarybot/status/1563140493982060546arrow-up-right

  4. Ports and Firewalls: https://twitter.com/thebinarybot/status/1564629802014965765arrow-up-right

  5. SSL & TLS: https://twitter.com/thebinarybot/status/1565314826305421312arrow-up-right

  6. Proxy and Reverse Proxy: https://twitter.com/thebinarybot/status/1569700581626855425arrow-up-right

  7. HTTP Requests and Responses: https://twitter.com/thebinarybot/status/1577261081948553217arrow-up-right

  8. Cookies: https://twitter.com/thebinarybot/status/1578032467520331776arrow-up-right

  9. Token-Based Authentication: https://twitter.com/thebinarybot/status/1578363302803013633arrow-up-right

  10. JSON Web Tokens (JWTs): https://twitter.com/thebinarybot/status/1583132736184647686arrow-up-right

Now that you've learnt the basics, checkout these threads before you start.

  • How would I start my journey from scratch: https://twitter.com/thebinarybot/status/1557705929633792002arrow-up-right

  • Choosing the right program: https://twitter.com/thebinarybot/status/1559171143390695424arrow-up-right

PreviousInitchevron-leftNextTipschevron-right

Last updated 3 years ago

Was this helpful?

Was this helpful?