Tag: bug-bounty

  • BBOT: The Swiss Army Knife for Recon, Bug Bounties, and ASM

    Meet BBOT: Your New Favorite Recon Tool

    BBOT (short for BeeĀ·bot) is a powerful, multipurpose Python-based scanner designed to automate recon, bug bounty hunting, and attack surface management (ASM). Inspired by tools like Spiderfoot but modernized for today’s needs, BBOT delivers speed, modularity, and scalability for cybersecurity professionals and hobbyists alike.

    With native support for multiple targets, extensive output options, and seamless integration with popular APIs, BBOT is more than a tool-it’s a full-fledged recon framework that adapts to your workflow.

    Why BBOT?

    Reconnaissance is the foundation of offensive security. BBOT streamlines this critical phase with:

    • Subdomain enumeration that consistently outperforms other tools
    • Web spidering and email harvesting
    • Light and aggressive web scanning presets
    • YAML-driven customization with modular architecture
    • Support for over a dozen output formats including Neo4j, CSV, JSON, and Splunk

    Installation Made Simple

    To get started with BBOT, simply run:

    pipx install bbot

    For the latest development version:

    pipx install --pip-args '--pre' bbot

    Docker images and advanced installation options are available via the official Getting Started guide.

    Core Features & Usage Examples

    Subdomain Enumeration

    Discover subdomains using passive APIs and brute-force techniques:

    bbot -t evilcorp.com -p subdomain-enum

    BBOT finds 20-50% more subdomains than other tools, especially on larger domains.

    Web Spidering

    Extract emails and files by crawling target websites:

    bbot -t evilcorp.com -p spider

    Email Harvesting

    Scrape email addresses from web content and APIs:

    bbot -t evilcorp.com -p email-enum

    Web Scanning

    Run lightweight or aggressive web scans:

    bbot -t www.evilcorp.com -p web-basic
    bbot -t www.evilcorp.com -p web-thorough

    Everything at Once

    For comprehensive recon in one go:

    bbot -t evilcorp.com -p kitchen-sink --allow-deadly

    Targets and Scope

    BBOT accepts a wide range of target types, including:

    • Domains (e.g. evilcorp.com)
    • IP ranges (e.g. 1.2.3.0/24)
    • URLs, emails, organizations, usernames
    • Even mobile app package names and file paths

    Define scope via command-line or config files to keep scans focused and efficient.

    Output Options

    BBOT can export scan data to:

    • Neo4j, Elasticsearch, and Splunk for advanced querying
    • Slack, Discord, and Microsoft Teams for real-time alerts
    • SQL databases and CSV/JSON files for storage and analysis

    Security and Dependencies

    BBOT supports API key configuration for services like Shodan, VirusTotal, and SecurityTrails. Keys can be added to your ~/.config/bbot/bbot.yml file or passed directly via the command line.

    All dependencies are auto-installed, and Ansible scripts are provided for streamlined environment setup.

    Python API for Developers

    Use BBOT as a library for custom applications. Both synchronous and asynchronous scanning are supported:

    from bbot.scanner import Scanner
    scan = Scanner("evilcorp.com", presets=["subdomain-enum"])

    Community & Contributions

    BBOT thrives on community contributions-from module ideas to code enhancements. Check out the developer docs to get involved.

    Final Thoughts

    BBOT isn’t just another recon tool. It’s a flexible, extensible framework built for modern offensive security workflows. Whether you’re working on bug bounties or managing enterprise attack surfaces, BBOT gives you the power to automate and innovate your reconnaissance efforts.

    Ready to scan smarter? Explore BBOT now.

  • Hacker101: A Free Web Security Training Platform for Aspiring Hackers

    Introduction

    Whether you’re just getting started in cybersecurity or looking to sharpen your web security skills, Hacker101 is a free, community-driven training platform designed to help you learn ethical hacking and bug bounty techniques from the ground up. Developed by the team at HackerOne, Hacker101 provides a solid foundation for anyone serious about web application security.

    Purpose and Real-World Use Cases

    Hacker101 is perfect for:

    • Aspiring bug bounty hunters looking to land their first report or improve their skills.
    • Web developers who want to secure their applications and understand how attackers think.
    • Security professionals seeking structured, self-paced training material to stay sharp.

    The platform includes video lessons, writeups, CTF-style challenges, and labs that simulate real-world vulnerabilities found in web applications.

    Installation and Setup

    If you’d like to run the Hacker101 site locally or contribute to its content, follow these steps:

    Prerequisites:

    • Ruby – recommended to install via rbenv
    • Bundler – install with: gem install bundler

    Steps:

    1. Clone the repository:
      git clone https://github.com/Hacker0x01/hacker101.git
    2. Navigate to the project directory and install dependencies:
      bundle install
    3. Start the local server:
      bundle exec jekyll serve
    4. Visit http://localhost:4000 in your browser.

    Core Features and Structure

    Hacker101 offers:

    • Video lessons that cover topics like XSS, SQLi, authentication bypasses, and more.
    • Capture the Flag (CTF) challenges to test and apply your knowledge.
    • Writeups from the community and HackerOne staff to deepen your understanding of real-world bugs.
    • Open-source access so you can contribute new lessons or fix existing ones.

    It’s a complete package whether you’re preparing for bug bounty programs or just learning to secure your apps.

    Security Considerations

    Since the platform is educational and does not involve exploiting live systems, it’s perfectly safe to use in any environment. If you’re running the site locally, make sure:

    • You don’t expose it to the internet unintentionally.
    • You keep Ruby and dependencies up-to-date to avoid local vulnerabilities.

    Why Hacker101?

    Hacker101 stands out by being:

    • Beginner-friendly with clear, step-by-step lessons.
    • Accessible through its free and open-source content.
    • Practical with exercises that reflect real bug bounty scenarios.

    Backed by HackerOne, it also gives you the opportunity to practice with CTFs and potentially earn invites to private programs.

    Get Involved

    You can contribute to Hacker101 by submitting pull requests, fixing issues, or even creating new lessons. Community collaboration is encouraged and welcomed through GitHub.

    Conclusion

    Hacker101 is more than a course-it’s a stepping stone into the professional world of ethical hacking and web security. If you’re ready to learn how the internet can be broken (and how to fix it), this is your invitation to dive in.

    Start learning at https://www.hacker101.com.