Sources: NahamSec, The Cyber Mentor, Insider PhD
Tips
- make a procedure/checklist/methodology (i.e. what to check for, like recon, PHP type juggling, SSRF, etc)
 - don’t spray the same vuln over a bunch of programs
 - look for complex programs
 - don’t be stuck just consuming content; actually put skills to practice; learn and do in parallel
 - try to understand the functionalities of the target application/service; try to use the features available first, before trying to hack them
 - hack on a VDP (vuln disclosure program) before doing bug bounty (e.g. hackerone active programs); submitting stuff on hackerrone will likely cause people to invite you to private programs
 
How to Get Started with Bug Bounty - InsiderPhD - YouTube
- traditional learning pipeline
- learn about security
 - do CTFs
 - find bugs
 - BAD. Start doing things instead of just learning.
 
 - CTFs are not perfect – too vulnerable compared to real apps
- Not to say that they are not hard.
 
 - better way to learn:
- try to find bugs on the target
 - encounter something new? try a CTF challenge, or read a writeup about it (e.g. in a real CVE disclosure)
 - try what you learned on the target
 - rinse and repeat
 
 - Spoiler: cyber security is hard
 - immerse yourself:
- don’t just read stuff at current experience level
 - read stuff you don’t completely understand but you try to
 - follow Twitter people who post complex writeups
 - read disclosure reports
 - be comfortable with new stuff, with the unknown; get inspired
 
 - resources
- actually hacking something: HackerOne, BugCrowd, Synack, Intigriti
- try even if you don’t anything
 - trial-by-fire learning
 - kind of scary, but take the leap of faith
 
 - OWASP: OWASP Top 10, bypasses, bug classes (more mitigation-oriented, but still useful for red teaming, etc)
 - CTFs: Hacker101 (high level in CTF may give invitations to private programs!), DVWA, Juice Shop, actual CTFs, etc
 - courses: TCM, Pentester Lab, PortSwigger Web Security Academy…
 - videos: InsiderPhD, STOK, TCM, MIT OCW, recordings of people actually doing bug bounty
 - tools & tool tutorials: Burp Suite
 - conferences: DEFCON, BSides, BlackHat (to learn: YT recordings, to network: in-person)
 - Podcasts: The Bug Bounty Podcast, Darknet Diaries, Security Now, Risky Business
 - books: OWASP Testing Guide, etc (not the best way to learn)
 - certs: …
 - write-ups & disclosures: @disclosuredh1, HackerOne Hacktivity, Twitter, etc
 - aggregators & newsletters: Pentester Land
 - community: Twitter 
#BugBounty#bugbountytips, Hacker101 Discord, Bug Bounty Forum, etc - teach others: make YT videos, help someone solve a CTF, write tutorials, mentor someone
 
 - actually hacking something: HackerOne, BugCrowd, Synack, Intigriti
 - study plan
- practice on CTFs
 - consume disclosure reports and writeups
 - hack real targets (ASAP/parallel)
 
 - beyond beginner
- consuming beginner resources might become boring at sometime
 - get involved in the community!
- share resources
 - participate or organize IRL meetups
 - release tools
 - share tips
 
 - identify weaknesses
 - attend more conferences
 - read more writeups to see how other people approach a problem
 - read security newletters (Pentester Land)
 - …