📛
Cybersecurity
  • Init
  • 🐞Bug Bounty Hunting
    • Basics
    • Tips
    • Tools
    • Articles
    • Talks Summarized
  • 📑Certifications
    • eJPT
  • 🚀Web3 Sec
    • Web3 Basics
Powered by GitBook
On this page

Was this helpful?

  1. 🐞Bug Bounty Hunting

Basics

First things first

Fundaments : Understanding the Internet

  1. Understanding the Model: https://twitter.com/thebinarybot/status/1562054331859345410

  2. DNS: https://twitter.com/thebinarybot/status/1562431068376276992

  3. DNS Records: https://twitter.com/thebinarybot/status/1563140493982060546

  4. Ports and Firewalls: https://twitter.com/thebinarybot/status/1564629802014965765

  5. SSL & TLS: https://twitter.com/thebinarybot/status/1565314826305421312

  6. Proxy and Reverse Proxy: https://twitter.com/thebinarybot/status/1569700581626855425

  7. HTTP Requests and Responses: https://twitter.com/thebinarybot/status/1577261081948553217

  8. Cookies: https://twitter.com/thebinarybot/status/1578032467520331776

  9. Token-Based Authentication: https://twitter.com/thebinarybot/status/1578363302803013633

  10. JSON Web Tokens (JWTs): https://twitter.com/thebinarybot/status/1583132736184647686

Now that you've learnt the basics, checkout these threads before you start.

  • How would I start my journey from scratch: https://twitter.com/thebinarybot/status/1557705929633792002

  • Choosing the right program: https://twitter.com/thebinarybot/status/1559171143390695424

PreviousInitNextTips

Last updated 2 years ago

Was this helpful?