Skip to content

Bergee's Stories on Bug Hunting

hacking, cyber security and programming

Menu
  • Blog
  • About Me
  • Contact
  • Resources
  • Side projects
Menu

Breaking things legally for fun and profit

2022-08-122022-09-07

Now and then we can hear that some company has been hacked. People think it’s black magic or something. No, it’s not. It usually means some evil dude found a way to break the system’s security mechanisms to get into the system. It might be either innocent such as a company’s website defacement to show off or a serious security breach such as stealing confidential information – documents or customers’ data. In both cases, the company suffers losses.

There is also a group of people who does it out of curiosity. They don’t want money, don’t want to be famous, they just want to challenge themselves. Sometimes they even report the vulnerabilities they found to the company in good faith. Unfortunately, this very often ends up in court. Despite their intentions, this is treated as breaking the law and they have problems.

So what if you want to be one of them but not break the law at the same time? Is it possible? The answer is YES!!! And even more – you can not only challenge yourself but also be rewarded for your time and effort at the same time. Bug Bounty Programs come into play.

The “Bug Bounty Program” is a program runs by the company, which allows people from the outside (wannabe hackers, security specialists, researchers, and you) to search for vulnerabilities inside the company’s assets. If you find a valid vulnerability – you will be (mostly) awarded for it somehow.

There are two types of bug bounty programs – the one the company runs on its own and the “Bug Bounty Platform” which is a kind of bridge between the bug hunter and the company which runs the program. The bug bounty platform hosts many bug bounty programs from different companies.

The programs on the bug bounty platform may be public or private ones. The public ones are available to everybody whilst the private ones are available only for the chosen researchers who already have some reputation on the platform. In this case, they get special invitations to participate in a private program. The main rule of bug bounty programs is when that you have to be first to find the bug. Only then you will be rewarded. Otherwise, your finding will be treated as a duplicate. It gives you knowledge and experience but no reward.. and it is sometimes frustrating. That’s why if you hack on the private program, you have less competition and a higher chance of getting the valid bug.

There is also a category like VDP which stands for Vulnerability Disclosure Program. Simplified things this is a kind of Bug Bounty Program without bounty :). I mean a company that runs this kind of program will accept the bugs and you might expect in return:

  • nothing
  • “thank you” e-mail or letter of appreciation
  • entry in the Hall of Fame – your name will be listed among other hackers on the special “Thank You” page
  • reward such as swag (the mug, some gadget, gift card, t-shirt)

It all depends on the company. I personally think VDPs are good for beginners to sharpen their skills, as they are less crowded because everybody goes for money :].

The VDPs I’ve got good experience with are:

  • BBC
    https://www.bbc.com/backstage/security-disclosure-policy/ – really cool t-shirts
  • Government Of The Netherlands
    https://www.government.nl/topics/cybercrime/fighting-cybercrime-in-the-netherlands/responsible-disclosure
  • Erasmus University Rotterdam
    https://www.eur.nl/en/campus/locations/campus-woudestein/security-safety/information-security/responsible-disclosure
  • RedBull
    https://app.intigriti.com/programs/redbull/redbull/detail – found on Intigriti platform

The bug bounty platforms I am active at are:

  • Hackerone – https://hackerone.com/users/sign_up
  • Intigriti – https://login.intigriti.com/account/register
  • Bugcrowd – https://bugcrowd.com/user/sign_up

There are more bug bounty platforms, however, I don’t have any experience with them. Try them and challenge yourself.

Bug Bounty PlatformWebsite URL
1HackerOnehttps://www.hackerone.com
2Bugcrowdhttps://www.bugcrowd.com
3Synackhttps://www.synack.com
4Detectifyhttps://cs.detectify.com
5Cobalthttps://cobalt.io
6Open Bug Bountyhttps://www.openbugbounty.org
7Zero Copterhttps://www.zerocopter.com
8Yes We Hackhttps://www.yeswehack.com
9Hacken Proofhttps://hackenproof.com
10Vulnerability Labhttps://www.vulnerability-lab.com
11Fire Bountyhttps://firebounty.com
12Bug Bountyhttps://bugbounty.jp
13Anti Hackhttps://antihack.me
14Intigrityhttps://intigrity.com
15Safe Hatshttps://safehats.com
16Red Stormhttps://www.redstorm.io
17Cyber Armyhttps://www.cyberarmy.id
18Yogoshahttps://yogosha.com
Source: https://ethicalhackx.com/list-of-bug-bounty-platforms/

See you next bug 🙂

  • A Little Break from Bug Bounty – I Made a Word Search Game!
  • How I hacked XXXX for fun and !profit
  • Accessing admin panel with fuzzing, digging and guessing
  • From AngularJS CSTI to credentials theft
  • The story of exposed service, SSRF, CSP bypass and credentials stealing via XSS
  • “Hacking” the hotel room TV
  • Broken links hijacking and CDN takeover
  • How I found multiple critical bugs in Red Bull
  • Chaining multiple vulnerabilities for credential stealing
  • Blind account takeover
  • Turning cookie based XSS into account takeover
  • Blind os command injection
  • Five-minute hunting for hidden XSS
  • URL filter bypass, RFI and XSS
  • The forgotten API and XSS filter bypass
  • XSS via Angular Template Injection
  • Breaking things legally for fun and profit

Hackers' playground


https://www.tryhackme.com
https://www.pentesterlab.com
https://www.hackthebox.com
https://portswigger.net/web-security/all-labs
© 2025 Bergee's Stories on Bug Hunting