Starting your bug bounty journey in 2025? š„· Here are 5 practical tips that we can share with you to help you find your first bug faster! š¤ š§µ š
Intigriti Bug Bytes #220 - January 2025 š
By blackbird-eu
January 10, 2025
Welcome to the first Bug Bytes of 2025! Each month, we team up with bug bounty experts to bring you insights, platform updates, new programs, and upcoming community eventsāall to help you find more bugs!
Latest Platform Updates
Altera, an Intel company, has officially opened its public bug bounty program on our platform! Ā
Ā
Ready to put your skills to the test and get rewarded for vulnerabilities found?Ā Start hunting today.Ā
Altera bug bounty
CTF Challenges on GitHub
Intigriti 1337UP Live CTF Event 2024
CryptoCat has uploadedĀ allĀ former challenges across our CTF series (22 ā 24) to our GitHub, check these outĀ here.
Monthly Challenge
CTF Challenge 0125
Intigriti's January Challenge by Godson is live! Pop an alertĀ hereĀ by 17th January for a chance to win ā¬400 in SWAG prizes!
Blogs and Videos
Testing JavaScript Files for Bug Bounty Hunters!
Testing JavaScript files for bug bounty hunters Featured Image
JavaScript files are goldmines for bug bounty hunters like you! They can help you find all sorts of vulnerabilities, from hard-coded secrets to hidden API endpoints and even DOM-based vulnerabilities! If you want to dive deeper into JS files, weāve recently made an article just for you!Ā ReadĀ Testing JavaScriptĀ filesĀ for bug bounty huntersĀ on our blog!
Wonder how PRO hunters keep finding and exploiting blind XSS vulnerabilities? Weāve shared an entire methodology,Ā from server setup to finding your first blind XSS vulnerability!
Insecure file uploads can introduce various critical vulnerabilities, including RCE! Make sure you try outĀ these 7 techniques whenever youāre testing file upload functions on your target!
Are you trying any ofĀ these 5 recon techniquesĀ that most hunters forget about? If not, we highly recommend you do! And while youāre on Twitter/X,Ā try to drop us a follow! We share new bug bounty tips and resources (almost daily) to help you find more vulnerabilities!
Tools and Resources
Tools
GitLab Subdomains
GitLab Subdomains
Finding subdomains using GitLab search?Ā @gwendallecoguicĀ made anĀ open-source tool to help you find even more subdomains!
Want to find more DOM-based vulnerabilities?Ā Check Untrusted Types by @filedescriptor, an open-source web extensionĀ to help you easily track arbitrary input originating from DOM sources and directly inserted in DOM sinks!
This tool by @pdiscoveryio allows you to quickly combine the results of 10s of APIsĀ such as Shodan, Censys, Hunter, Fofa, etc to help you discover more hosts!
PortSwigger recently published a new interactive URL validator cheat sheetĀ that can help you bypass flawed URL validations to help you exploit SSRF vulnerabilities for example!
Resources
Starting Your Bug Bounty Journey in 2025?
Are you starting your bug bounty journey in 2025? Let us help you out a bit - check outĀ this quick guide on tips for bug bounty beginners!
Imagine you received a new Discord message, opened it and got malicious code executed on your machine...Ā This is how @S1r1u5_ found a remote code execution in Discord for $5000!
In case you arenāt aware,Ā @albinowax shared his DEFCON talk āListen to the Whispers: Web Timing Attacks that Actually Workā!
Need an extensive SQL injection cheat sheet for bug bounty hunting and pentesting in general?Ā Check out @0xTib3riusā SQL Injection cheat sheet, it provides payloads for the 5 most popular databases such as MySQL, PostgreSQL, Oracle, etc.!
Learn from the hacker legends themselves!Ā @ArchAngelDDay sharesĀ how he became the most valuable hacker!
@lukejahnke shared an interesting way to still send POST requests without a content type request headerĀ to help exploit certain CSRF vulnerabilities!
2024 Wrapped
2024 was a milestone year for us at Intigriti and we couldnāt resist creating our very own 2024 wrapped to reflect this ā check out the numbers below š
2024 Wrapped
Want the break-down of these numbers? Head to our accompanyingĀ blogĀ to read more š
Behind The Screens
Back in December we kicked off the holiday season with our end of year parties for both our UK & Belgium offices.
In the UK, the team enjoyed a drinks reception and some virtual clay pigeon shooting (no pigeons were harmed in the making of this event š)
Behind the Screens
Behind the Screens
Meanwhile over in Belgium our team enjoyed some festive team building exercises (courtesy ofĀ Escape the Box) followed by a team dinner to kick off the holidayās!
Behind the Screens
Feedback and Suggestions
Our researchers are at the core of everything we do. If you have feedback or suggestions to help us build and grow, we want to hear from you!Ā Ā
Pop a note over toĀ support@intigriti.comĀ and weāll take it from there!
As we step into the promise of a new year, January can often be a time to reflect and set goals.Ā
Intigriti is no exception to the rule - weāve set big goals to ensure we continue to deliver a leading bug bounty platform for all.Ā
Whatever your ethical hacking goals, weāre looking forward to supporting you every step of the way.Ā
Wishing you a ābounty-full' start to the year ahead and become the researcher you always wished,
Meme
You may also like
Intigriti Bug Bytes #219 - December 2024 š
December 13, 2024
Bug Bytes #218 ā Advent of Cyber, RCEs and hacking poems
December 6, 2023