<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.cyberdiary.net/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.cyberdiary.net/feed.php">
        <title>Cybersecurity - bbc</title>
        <description></description>
        <link>https://wiki.cyberdiary.net/</link>
        <image rdf:resource="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-14T10:56:37+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:01_picking_program&amp;rev=1778749508&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:02_sustaining_success&amp;rev=1778749508&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:03_how_internet_works&amp;rev=1778749890&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:04_env_setup&amp;rev=1778749890&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=bbc:08_clickjacking&amp;rev=1778752117&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Cybersecurity</title>
        <link>https://wiki.cyberdiary.net/</link>
        <url>https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:01_picking_program&amp;rev=1778749508&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:05:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>01_picking_program</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:01_picking_program&amp;rev=1778749508&amp;do=diff</link>
        <description>Ch 1: Picking a Bug Bounty Program

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

Asset Types

Bug bounty programs define scope by listing assets -- the systems you are authorized to test.

	*  Social targets -- Twitter/Facebook/LinkedIn pages. Usually out-of-scope because you can't control what users post.</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:02_sustaining_success&amp;rev=1778749508&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:05:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>02_sustaining_success</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:02_sustaining_success&amp;rev=1778749508&amp;do=diff</link>
        <description>Ch 2: Sustaining Your Success

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

Writing Good Reports

A report is how you get paid and build reputation. Bad writing = low payouts + duplicates marked invalid.

8-step report structure:</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:03_how_internet_works&amp;rev=1778749890&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:11:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>03_how_internet_works</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:03_how_internet_works&amp;rev=1778749890&amp;do=diff</link>
        <description>Ch 3: How the Internet Works

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

Client-Server Model

Web apps operate on a client-server model. The client (browser) sends HTTP requests; the server processes them and returns responses.</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:04_env_setup&amp;rev=1778749890&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:11:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>04_env_setup</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:04_env_setup&amp;rev=1778749890&amp;do=diff</link>
        <description>Ch 4: Environmental Setup and Traffic Interception

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

OS

Use a Unix-based system. Kali Linux is recommended -- it ships with Burp Suite, Gobuster, DirBuster, Wfuzz, and other tools. macOS also works fine.</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=bbc:08_clickjacking&amp;rev=1778752117&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:48:37+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>08_clickjacking</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=bbc:08_clickjacking&amp;rev=1778752117&amp;do=diff</link>
        <description>BBC Ch 8: Clickjacking

Source: Bug Bounty Bootcamp by Vickie Li

Clickjacking (user-interface redressing) tricks users into clicking a malicious button that has been made to look legitimate. Attackers use HTML page-overlay techniques to hide one web page within another.</description>
    </item>
</rdf:RDF>
