bbc:01_picking_program
Table of Contents
Ch 1: Picking a Bug Bounty Program
Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)
Asset Types
Bug bounty programs define scope by listing assets – the systems you are authorized to test.
- Social targets – Twitter/Facebook/LinkedIn pages. Usually out-of-scope because you can't control what users post.
- General web applications – websites and APIs. Most common target type.
- Mobile applications – iOS and Android apps. Require emulators or real devices; different attack surface than web.
- APIs – REST, SOAP, GraphQL endpoints. May have separate scope from the main web app.
- Source code – programs that give you the source and ask you to review it. High-skill, high-reward.
- Hardware/IoT – physical devices. Requires hardware and firmware expertise; rare but lucrative.
Platforms
- HackerOne – largest platform; public and private programs; good for beginners
- Bugcrowd – second largest; well-known programs; managed triage
- Intigriti – European-focused; growing program list
- Synack – invite-only, vetted researchers; pays well; structured environment
- Cobalt – pentest-as-a-service hybrid; invite-only; fixed-term engagements
Many companies run private programs that are invite-only. You earn invites by performing well on public programs. Private programs have less competition and often better payouts.
Reading the Scope
Before testing, read the scope section carefully:
- Note which subdomains/domains are in scope vs. out of scope
- Note excluded vulnerability classes (e.g., “self-XSS is not a valid finding”)
- Note safe harbor language – does the program promise not to sue you?
- Check response times – how fast does triage respond? (listed on most platforms)
- Check average bounty amounts – some programs list historical payouts
Payouts
Typical ranges (vary widely by program):
- Low/Informational: $0-100
- Medium: $100-1,000
- High: $1,000-5,000
- Critical: $5,000-50,000+
Some programs (Google, Apple, Microsoft) pay $100,000+ for critical findings.
Choosing a Program
Vickie Li's advice for beginners:
- Start with programs that have large scopes (wildcards like *.example.com) – more attack surface = more bugs
- Choose programs with fast response times – you want feedback to learn
- Avoid programs with a history of disputes or low triage quality
- Pick targets in domains you already understand (e.g., if you know e-commerce, target retail sites)
- Private programs are better once you can get invites; less competition
Quick Checklist
- [ ] Read full scope before testing anything
- [ ] Verify your target is actually in scope
- [ ] Note exclusions (self-XSS, rate limiting, etc.)
- [ ] Check safe harbor clause
- [ ] Confirm you understand payout structure
bbc/01_picking_program.txt · Last modified: by drew
