📛
Cybersecurity
  • Init
  • 🐞Bug Bounty Hunting
    • Basics
    • Tips
    • Tools
    • Articles
    • Talks Summarized
  • 📑Certifications
    • eJPT
  • 🚀Web3 Sec
    • Web3 Basics
Powered by GitBook
On this page

Was this helpful?

  1. Bug Bounty Hunting

Basics

First things first

PreviousInitNextTips

Last updated 2 years ago

Was this helpful?

Fundaments : Understanding the Internet

  1. Understanding the Model:

  2. DNS:

  3. DNS Records:

  4. Ports and Firewalls:

  5. SSL & TLS:

  6. Proxy and Reverse Proxy:

  7. HTTP Requests and Responses:

  8. Cookies:

  9. Token-Based Authentication:

  10. JSON Web Tokens (JWTs):

Now that you've learnt the basics, checkout these threads before you start.

  • How would I start my journey from scratch:

  • Choosing the right program:

🐞
https://twitter.com/thebinarybot/status/1562054331859345410
https://twitter.com/thebinarybot/status/1562431068376276992
https://twitter.com/thebinarybot/status/1563140493982060546
https://twitter.com/thebinarybot/status/1564629802014965765
https://twitter.com/thebinarybot/status/1565314826305421312
https://twitter.com/thebinarybot/status/1569700581626855425
https://twitter.com/thebinarybot/status/1577261081948553217
https://twitter.com/thebinarybot/status/1578032467520331776
https://twitter.com/thebinarybot/status/1578363302803013633
https://twitter.com/thebinarybot/status/1583132736184647686
https://twitter.com/thebinarybot/status/1557705929633792002
https://twitter.com/thebinarybot/status/1559171143390695424