CategoryRed

Bug Bounties and You

While I was looking for ways to learn more about security without causing real world damage or getting the feds knocking on my door, I started reading about bug bounties and had gained more interest in doing bug bounties for a lot of reasons.  Not just the normal reasons like “they’re fun”, or “they’re a good learning experience”, or even “I could make money”.

Don’t get me wrong those are all valid reasons, and it wouldn’t be wrong to assume they weren’t mine, but I had something simpler in mind:  This is a skill that has absolutely no barrier to entry beyond tenacity and the discipline to teach yourself some skills, and in return a bounty hunter can make a few bucks independent of any company or organization.The notion of being able to utilize a useful skill independently appealed to me meant a form of independence.

Continue reading

dc416-baffle

In between this being the first vm I’m working on that includes a write up and being tied up with a few other projects I didn’t spend as much time as I wanted on this but am going to start with my blueprint for future write ups with the intent to keep them succinct.

The first thing I usually do when I work on a vm is get my environment set up and I will only mention environment setup in the event something causes me to configure it differently (e.g. the vm having a static IP address on a different network).  I summarize in this article how I will approach future VMs.  As my process changes, I will update this article.

Continue reading