How I got my First $$$$ bounty from finding a bug in Facebook:

How I got my 1st bounty:

Complete Details :

Impact:

Repro steps:

Steps:

Timeline :

Thank you for reading : )

--

--

--

PEN WITH INFINITE INK!

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Data Security — an Introduction to AWS KMS and HashiCorp Vault

Intercept SSL traffic to perform penetration testing on Android apps using Charles Debug Proxy

Case Study: Google Pixel 6 phone security & Privacy (Part 1 — Threat Analysis and Countermeasures)

Restrict AWS IAM User API Calls from Specific IPs — Hardening Your AWS Programmatic Access User…

Ethical Hacking Capture The Flag Walkthrough — Pumpkin Garden

Upon starting the PumpkinGarden machine, you are greeted with this login screen. Here you will get the ip address of the Vulnerable machine and a login page.

SPRINGROLE ATTESTATION PROTOCOL WILL BRING A BRIGHT FUTURE FOR US ALL

How to monitor Ethereum transactions?

Unlocking the Future with our Bodies

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Aashish Kunwar

Aashish Kunwar

PEN WITH INFINITE INK!

More from Medium

How I hacked my way to the top of DARPA’s hardware bug bounty

An illustration of the Pentagon ringed by computer chips and yellow dots.

Security Explained: Mobile Threats

Log4J Vulnerability (CVE-2021–44228)

SSL Pinning Bypass With Objection