Bug Bounty Hunter
Agenda
• Who Am I ?
• What is Bug Bounty ?
• Who can be a Hunter and How ?
• Skill Test
• Resources
• Platforms
• Q&A
• End
I’m
• Yousef Ahmed (Y0S3TREX)
• Offensive security Researcher @ Digital fortress EG
• Part Time Bug Hunter
• HACKED :
Swisscom , IBM , Porsche , MailChimp , NCUA (HOF) and more companies
What Is Bug Bounty
It’s usually the first step anyone takes when getting into cybersecurity.
In a bug bounty program, ethical hackers look for security vulnerabilities in
websites or apps, then report them legally to companies. In return, they might
receive money, recognition, or both
Bug Bounty is one of the most important and in-demand skills in the Cyber
Security field.
Who can be a Hunter ?
Anyone can become a bug hunter — you don’t need to be a genius or have a
cybersecurity degree. Bug bounty is open to :
• Anyone interested in cybersecurity
• Developers who want to explore security
• People making a career shift into tech
• Anyone who loves programming or
hacking
• Literally anyone, from any background
How To Become a Hunter ?
Programing Course’s Operating Sys Red team certificate What After ?
HTML CS50 CompTIA Linux+ EWAPT/X
EJPT v1 (OWASP TOP 10)
JS CCNA Windows RECON
CEH
PHP CompTIA Network+ CompTIA A+ LIVE HUNTING
MySQL network fundamentals
Python
ALL RESOURSEC : My Blog
Skill Test
Solve Lab’s
TryHackMe
HackTheBox
portswiggert
101 LABS
Platforms ?
HackerOne Bugcrowd YesWeHack Intigriti
Need More ?? OK ALL BUG BOUNTY PLATFORMS
Q & A
END
Contact Me
If u Have Any Question u can Text Me in
Linked-In ALL LLINK’S
و ان اسأت فمن نفسي او السيطأن, ان احسنت فمن الله