Kaiser784's Blog
  • whoami
  • Ingress
  • 90 Day High Frequency
    • Log-1
    • Log-2
    • Log-3
    • Conclusion
  • Making a Boot2root machine with docker
  • Adversarial ML
    • Practical Defenses against Adversarial ML
  • Certifications
    • eJPT
      • Cheatsheet/Notes
        • Enumeration
        • Web Attacks
        • System Attacks
        • Network Attacks
    • Dante ProLabs (HackTheBox)
  • Writeups
    • Google InternetCTF writeup
    • Lakera Gandalf LLM Security
    • OSPG Writeups
    • Matrix - AI Security Challenge by Repello writeup
    • WithSecure AI Challenge - My LLM Doctor writeup
    • WIZ Security Challenges
      • The BIG IAM Challenge writeup
      • K8S LAN Party Writeup
      • EKS Cluster Games Writeup
      • Prompt Airlines Writeup
  • Misc
    • Paul Kadali
    • Redirection
Powered by GitBook
On this page
  • Summary
  • Takeaways
  • Catenate (some links if you wanna follow some of the stuff I did)

Was this helpful?

  1. 90 Day High Frequency

Log-1

Aug 31, 2021 - Sep 30, 2021

Previous90 Day High FrequencyNextLog-2

Last updated 3 years ago

Was this helpful?

Summary

Rather than starting to hunt for bugs right from the start I tried to learn about low-hanging bugs for the first 2 weeks and also read a minimum of 2 medium articles of writeups to gain more knowledge on different kind of bugs. I was surfing different programs during this time to see which one might suit me and I can use my beginner experimental knowledge, jumped through different programs but then I realized that I was looking at these programs like a CTF or a pwn machine on HTB and trying to tackle them without a surface-wide recon or a long stakeout. I decided to develop a Bug-Bounty Methodology for myself and then comeback again on the 60th day until then learn about more different bugs.

In the same duration I was also trying to solve the Dante Pro Labs, hoping for the Synack Red Team waitlist Bypass. It was going smoothly except for the windows machines, so I decided to take Tib3rius's windows priv esc course and got back pretty smoothly on track with 16/27 flags by the 30th day. Took a break of 10 days from solving Dante because of University exams and also for a breather to get new perspectives. Solving Dante alongside bug hunting might've affected the way i approach things in both places, have to learn to isolate things more.

Not only just working on stuff, I decided to read Research Papers of different profs, one per week. Read 3 papers about hardware security, though I didn't understand it to the full extent I liked them and the prof's approach. I'll read more and try to mail them for a research intern openings and get more insights if possible.

Takeaways

Catenate (some links if you wanna follow some of the stuff I did)

https://www.bugcrowd.com/blog/how-to-succeed-in-bug-bounties-as-a-pentester/
https://www.bugbountyhunting.com/
https://github.com/honoki/bbrf-client
https://github.com/kurogai/100-redteam-projects
Practical Hardware attacks on Deep Learning
Side Channel Attacks
https://www.codewars.com
https://www.bugbountyhunter.com/
https://app.hackthebox.com/prolabs/overview/dante