Leanpub Header

Skip to main content

Practical Introduction to OSS Bug Hunting

Aiming to get my first CVE ID in 30 days

This book is a systematic and practical introductory guide to bug hunting, designed for those who have finished learning the basics of web security and are ready to achieve the real-world milestone of obtaining their first CVE ID.

Minimum price

$9.99

$14.99

You pay

$14.99

Author earns

$11.99
$

...Or Buy With Credits!

You can get credits with a paid monthly or annual Reader Membership, or you can buy them here.
PDF
EPUB
WEB
185
Pages
About

About

About the Book

This book is a systematic and practical introductory guide to bug hunting, designed for those who have finished learning the basics of web security and are ready to achieve the real-world milestone of obtaining their first CVE ID.

While there are many learning resources and practice environments available, mastering them is often not enough to break through the barrier of finding vulnerabilities in real products and successfully securing a recognized CVE.

Focusing on open-source software (OSS) on GitHub, this book condenses the author's personal expertise into a 30-day roadmap. It covers everything from selecting target OSS and "search techniques" for finding vulnerabilities within vast amounts of source code, to "code review" for understanding implementations and the "reporting skills" required to have a vulnerability officially recognized.

Through this book, let's take your first step from being a mere "learner" to becoming a "bug hunter." I hope that in 30 days, your first CVE ID—with your name etched into history—will be issued.

Recommended People

  • Those who want to try obtaining a CVE ID
  • Those who are motivated and enthusiastic
  • Those interested in web security or bug hunting
  • Those interested in vulnerability assessment or penetration testing
  • Those who want to challenge themselves with bug bounties in the future

Three Key Features of This Book

  1. "Living Knowledge" from an Active Bug Hunter
  2. Practical Wisdom on "Thought Processes" and "Strategy
  3. "Systematic" Coverage of the Entire Process


My hope is that this book serves as a catalyst for you to transition from being a mere "learner" to a "bug hunter" contributing to real-world security, resulting in the issuance of your very first CVE ID with your name engraved on it.


The suggested hashtag for this book is #OSSBugHunting

Share this book

Author

About the Author

morioka12

Security Engineer & Bug Bounty Hunter (since 2020)

I work as a penetration tester at cybersecurity company in Japan.

Contents

Table of Contents

0.1. Getting Started

  1. Purpose of This Book
  2. An Invitation to the Real World
  3. A 30-Day Intensive Roadmap
  4. A Message from the Author

0.2. 30-day Roadmap

1.1. [Day 1-2] Orientation

  1. Welcome to the World of Bug Hunting
  2. Overview of CVE
  3. Etiquette and Rules of Bug Hunting
  4. Selecting a Target

1.2. The Process for Obtaining a CVE ID

  1. The Five Steps
  2. Five Actions from a Bug Hunter’s Perspective (Report → Acquisition)
  3. The Key to Success: GitHub Security Advisories

1.3. The Secret to Target Selection

  1. Target Types and Difficulty Levels
  2. Selection Priority Checklist
  3. Targets to Avoid
  4. Finding Your Target OSS

1.4. Vulnerability Types and Characteristics by Target

  1. About General Web Vulnerabilities
  2. Characteristics by OSS Type
  3. 1. CVE Examples: Web Applications
  4. 2. CVE Examples: Libraries
  5. 3. CVE Examples: Frameworks
  6. Advice from the Author

2.1. [Day 3-4] Environment Construction and Tool Setup

  1. OSS Environment Construction
  2. Tool Setup
  3. Summary of Recommended Tools
  4. Advice from the Author

2.2. Tools and Debugging

  1. Three Essential Tool Elements to Master
  2. Main Uses of Tools
  3. Overview of the Tool Workflow
  4. Objectives of Debugging
  5. Debugging Techniques
  6. Benefits of Debugging Skills
  7. Advice from the Author

3.1. [Day 5-10] Initial Investigation Phase

  1. Understanding Specifications and Functions
  2. Identifying Input Points
  3. Intuition for Suspicious Areas (The Bug Hunter’s Scent)
  4. Important Attacker Perspectives

3.2. Vulnerability Scent and Strategy

  1. Characteristics by Target Type
  2. Points for Intuition and Instinct
  3. Turning Your Preferences into Strengths
  4. Bypassing Security Controls
  5. Advice from the Author

3.3. Taint Analysis in Practice

  1. The Three Elements of Taint Analysis
  2. Examples of Sink Lists by Language
  3. Choosing Between Backwards and Forwards Approaches
  4. Examples of Tracking Approaches
  5. Standard Taint Analysis Workflow
  6. Advice from the Author

3.4. Re-Examination of Past CVEs

  1. Listing and Dissecting Past CVEs
  2. Thinking Methodology: Devising “Bypass Techniques” from Fix PRs
  3. Common Bypass Technique Examples
  4. Mindset for Successful Bypassing
  5. 3 Steps for Re-verification
  6. Advice from the Author

3.5. Considering Attack Scenarios

  1. The Five Ultimate Goals
  2. Resolution of Attack Scenarios
  3. Attack Scenario Examples
  4. Advice from the Author

3.6. Multifaceted Perspectives and Note-Taking

  1. Common Multifaceted Perspectives
  2. Critical Thinking
  3. Thinking Evolution: Connecting the Dots
  4. Effective Note-Taking
  5. Advice from the Author

4.1. [Day 11-20] Vulnerability Investigation Phase

  1. The Hypothesis Verification Cycle
  2. Common Verification Points
  3. Core Verification Techniques
  4. Preserving Evidence
  5. Advice from the Author

4.2. Dynamic and Static Analysis in Practice

  1. Dynamic Analysis
  2. Static Analysis
  3. Secure Code Reading
  4. Grep Techniques
  5. Deep Dive into Libraries
  6. Strategies by Analysis Style
  7. General Investigation Flow
  8. Recommended Steps from the Author

4.3. AI Secure Code Review

  1. Approaches to AI Code Review
  2. Approaches to AI Secure Code Review
  3. The Three Principles
  4. Prompt Engineering Tips Examples
  5. Three Mindsets for Working with AI
  6. Advice from the Author

4.4. Threat Consideration and Proof

  1. Proving the Value of a Vulnerability
  2. The Boundary Between “Feature” and “Vulnerability”
  3. Solidifying Decisive Evidence
  4. Advice from the Author

5.1. [Day 21-25] Report Writing and Presentation

  1. Report Entry Items
  2. General Points
  3. Points for Reproduction Steps
  4. Points for Risk Assessment
  5. CVSS Score
  6. Follow-up After Reporting
  7. Advice from the Author

5.2. Creating a Proper PoC

  1. Why Provide a PoC?
  2. 1. JavaScript PoC Using DevTools
  3. 2. Python PoC Using the Terminal
  4. Choosing the Right PoC Format
  5. Important Considerations When Creating a PoC
  6. Advice from the Author

5.3. CVE Reported Cases

  1. 1. Improper Rate Limiting
  2. 2. Blind SSRF
  3. 3. SSTI to RCE
  4. 4. SQL Injection

6.1. [Day 26-30] Fixing the Vulnerability and Obtaining a CVE

  1. Verifying the Patch and Final Confirmation
  2. CVE ID Issuance and Disclosure
  3. Actions After Obtaining a CVE
  4. Lessons from Failure

6.2. 30-day Review and Next Steps

  1. Reviewing the 30 Days
  2. Potential Next Steps
  3. Differences Between OSS and Bug Bounty Programs

7. Conclusion

  1. The 30-Day Challenge
  2. To My Readers
  3. Final Words: With Gratitude
  4. Happy Bug Hunting!

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earned over $14 million writing, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub