00From Zero to First Bug: The Complete Beginner's Guide

Skill Level: 🟢 Beginner Time to Complete: 24 hours Goal: Find and report your first valid bug Last Updated: 2026-02-26


🎯 What You'll Achieve

By following this guide, you will:

  • ✅ Set up a professional bug hunting environment

  • ✅ Find your first security vulnerability

  • ✅ Write a professional bug report

  • ✅ Submit to a real bug bounty program

  • ✅ Potentially earn your first bounty ($100-$500 typical)


📊 Visual Roadmap

Visual guide: 6 steps from setup to first bounty


⏰ Timeline Breakdown

Phase
Time
What You'll Do

Hour 0-2: Setup

2 hours

Install tools, configure environment

Hour 2-4: Learn

2 hours

Understand basics, pick a target

Hour 4-8: Recon

4 hours

Find subdomains and live hosts

Hour 8-16: Testing

8 hours

Test for vulnerabilities

Hour 16-20: Documentation

4 hours

Write your first report

Hour 20-24: Submission

4 hours

Submit and follow up


Hour 0-2: Environment Setup

Step 1: Install Kali Linux (or Alternative)

Option A: Virtual Machine (Recommended for Beginners)

Option B: WSL2 on Windows

Option C: Native Installation (Advanced)

  • Download ISO from kali.org

  • Create bootable USB

  • Install alongside your OS

Step 2: Install Essential Tools

Run this automated installation script:

Run it:

Step 3: Configure Your Environment

Step 4: Test Your Setup

If all commands work, you're ready!


Hour 2-4: Understanding the Basics

What is Bug Bounty Hunting?

Bug bounty hunting is:

  • Finding security vulnerabilities in websites/apps

  • Reporting them responsibly to companies

  • Getting paid for valid findings

Types of Bugs (Easy to Hard)

🟢 Easy (Start Here):

  1. Information Disclosure - Exposed sensitive data

  2. Clickjacking - UI redressing attacks

  3. Missing Headers - Security headers

  4. Weak SSL/TLS - Certificate issues

🟡 Medium:

  1. Cross-Site Scriptingarrow-up-right (XSS) - JavaScript injection

  2. Open Redirects - Unauthorized redirects

  3. IDORarrow-up-right - Insecure direct object references

🔴 Hard:

  1. SQL Injectionarrow-up-right - Database attacks

  2. Remote Code Execution - Server takeover

  3. Authentication Bypass - Login bypasses

  4. Business Logic - Workflow flaws

Pick Your First Target

Best Programs for Beginners:

  1. HackerOnearrow-up-right Directory

    • Filter: "Beginner friendly"

    • Look for: Wide scope, responsive triagers

    • Avoid: Strict scope, slow response times

  2. Bugcrowdarrow-up-right

    • Join "Bugcrowd University" first

    • Look for "Priority 1-3" programs

    • Good: Yahoo, eBay, Netgear

  3. Public Programs with Wide Scope

    • U.S. Dept of Defense (hackerone.com/deptofdefense)

    • Shopify

    • Uber (select programs)

🎯 Recommended First Target:

  • U.S. Dept of Defense VDP

    • URL: https://hackerone.com/deptofdefense

    • Wide scope (.mil domains)

    • No payout (VDP) but great for learning

    • Fast triage

    • Good for resume


Hour 4-8: Reconnaissance (Finding Targets)

Step-by-Step Recon

Target Example: example.com (replace with your actual target)

1. Find Subdomains (Passive - Safe)

Expected Output:

2. Find Live Hosts

Expected Output:

3. Technology Detection

Expected Output:

Save Your Work


Hour 8-16: Finding Your First Bug

Strategy: Start with Low-Hanging Fruit

Bug #1: Information Disclosure (Easiest)

What to Look For:

  • Exposed .git directories

  • Backup files (.bak, .old, .zip)

  • Config files (.env, config.php)

  • API documentation

  • Debug information

Test These URLs on Each Host:

Finding Example:

Impact: Exposed environment variables often contain:

  • Database credentials

  • API keys

  • Secret tokens

  • Internal URLs

Bug #2: Cross-Site Scripting (XSS)

What is XSS? Injecting JavaScript into web pages that executes in victim's browser.

Simple Test (Reflected XSS):

  1. Find any input field (search box, contact form, etc.)

  2. Enter: <script>alert('XSS')</script>

  3. Submit and check if alert pops up

Automated Testing with Nuclei:

Manual Testing Script:

Bug #3: IDOR (Insecure Direct Object Reference)

What is IDOR? Accessing other users' data by changing IDs in URLs.

Example:

Automated Test:


Hour 16-20: Writing Your First Report

Report Structure

Template:

Example Report (Information Disclosure)

Creating Proof of Concept

Screenshots:

Screen Recording (Video):


Hour 20-24: Submission and Follow-Up

Submitting on HackerOne

  1. Log in to https://hackerone.com

  2. Navigate to your target program

  3. Click "Submit Report"

  4. Fill in:

    • Title: Clear and descriptive

    • Weakness: Select appropriate category

    • Severity: Your assessment

    • Description: Use your report template

    • Attachments: Screenshots/videos

  5. Submit

What Happens Next?

Timeline:

  • 0-3 days: Triage review

  • 3-7 days: Initial response

  • 1-4 weeks: Investigation

  • 2-6 weeks: Resolution and bounty

Possible Outcomes:

  • Valid - Bug accepted, bounty awarded

  • ⚠️ Informative - Valid but not bounty-eligible

  • Duplicate - Someone reported first

  • Not Applicable - Out of scope or not a bug

  • Spam - Invalid submission

Following Up

After 1 week (if no response):

Be patient but persistent. Professional communication is key.


🎉 Congratulations!

You've completed your first bug bounty hunt!

What to Do Next

  1. Celebrate 🎉 - You did it!

  2. Document what you learned

  3. Share your experience (if allowed)

  4. Start your next hunt

  5. Build your reputation

Building Your Reputation

Tips:

  • Submit quality reports consistently

  • Help triagers understand the issue

  • Be professional and patient

  • Share knowledge with community

  • Build your online presence

Track Your Progress:


💡 Pro Tips for Success

Tip 1: Start Small

  • Don't target Google or Facebook first

  • Begin with VDPs (Vulnerability Disclosure Programs)

  • Look for "beginner friendly" tags

Tip 2: Focus on One Bug Type

  • Master XSS first, then move to IDOR

  • Deep knowledge > broad knowledge

  • Become the "XSS expert"

Tip 3: Document Everything

  • Save all commands you run

  • Screenshot everything

  • Keep notes on what worked

Tip 4: Learn from Others

  • Read public reports on HackerOne

  • Follow bug hunters on Twitter

  • Join Discord communities

Tip 5: Be Persistent

  • 90% of hunting is finding nothing

  • That 10% pays for everything

  • Consistency beats intensity


📚 Resources for Beginners

Free Learning Platforms

YouTube Channels

Books (Free/Paid)

  • "The Web Application Hacker's Handbook" - Classic

  • "Real-World Bug Hunting" - Practical examples

  • "Bug Bounty Bootcamp" - Beginner friendly

Communities

  • Twitter: #bugbountytips

  • Discord: HackerOne Discord, Bugcrowd Discord

  • Reddit: r/bugbounty, r/netsec


⚠️ Common Beginner Mistakes

Mistake #1: Testing Without Authorization

❌ DON'T: Test random websites ✅ DO: Only test programs you're registered for

Mistake #2: Not Reading Scope

❌ DON'T: Test out-of-scope assets ✅ DO: Carefully read scope before starting

Mistake #3: Automated Scanning on Production

❌ DON'T: Run aggressive scans without permission ✅ DO: Check program rules about automation

Mistake #4: Poor Report Quality

❌ DON'T: Submit vague reports ✅ DO: Clear steps, screenshots, impact explanation

Mistake #5: Giving Up Too Soon

❌ DON'T: Quit after first rejection ✅ DO: Learn from feedback, try again


Test These Without Fear:

  1. PortSwigger Web Security Academy

    • https://portswigger.net/web-security

    • Designed for learning

    • No authorization needed

  2. OWASP WebGoat

    • Intentionally vulnerable app

    • Run locally

    • Safe to break

  3. DVWA (Damn Vulnerable Web App)

    • Practice SQL injection, XSS

    • Local installation

    • Learn safely

Installation:


📈 Your First 90 Days

Week 1-2: Foundation

  • Set up environment ✓

  • Complete this guide ✓

  • Submit 1-2 reports

Week 3-4: Practice

  • Do PortSwigger labs

  • Read 10 public reports

  • Submit 2-3 more reports

Month 2: Specialization

  • Pick one bug type (e.g., XSS)

  • Master it completely

  • Submit 5-10 reports

Month 3: Automation

  • Build recon automation

  • Create testing scripts

  • Scale your efforts

Goal: First bounty within 90 days!


🏆 Success Metrics

Track These:

  • Reports submitted: ___

  • Valid bugs: ___

  • Bounties earned: $___

  • Programs joined: ___

  • Skills learned: ___

Set Goals:

  • Week 1: Submit first report

  • Month 1: Get first valid triage

  • Month 3: Earn first bounty

  • Month 6: $1000 total earnings

  • Year 1: $10,000 total earnings


📞 Getting Help

Stuck? Ask for help:

  • HackerOne Support

  • Twitter #bugbountytips

  • Discord communities

  • This guide's GitHub issues

Remember: Everyone was a beginner once!


You did it! Welcome to bug bounty hunting! 🐛💰

Now go find some bugs!

Last updated