Page cover

questionHow-To Guide: Setting Up Your First Bug Bounty Lab

Skill Level: Beginner Time to Complete: 60 minutes Cost: $0 (using free tools) Goal: Create a safe environment to practice hacking


Why You Need a Lab

The Problem:

  • Can't practice on real targets without permission

  • Risk of legal issues if you test on production

  • Need safe environment to experiment

  • Must learn tools without breaking things

The Solution: Your own vulnerable lab environment where you can:

  • Practice legally and safely

  • Break things without consequences

  • Learn at your own pace

  • Test tools and techniques

  • Build confidence before real targets


Lab Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚         Your Computer               β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”‚
β”‚  β”‚   Kali Linux VM              β”‚   β”‚
β”‚  β”‚   β”œβ”€ Burp Suite              β”‚   β”‚
β”‚  β”‚   β”œβ”€ Nmap                    β”‚   β”‚
β”‚  β”‚   β”œβ”€ Nuclei                  β”‚   β”‚
β”‚  β”‚   └─ Custom tools            β”‚   β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β”‚
β”‚              β”‚                      β”‚
β”‚              β–Ό                      β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”‚
β”‚  β”‚   Vulnerable Targets         β”‚   β”‚
β”‚  β”‚   β”œβ”€ OWASP Juice Shop        β”‚   β”‚
β”‚  β”‚   β”œβ”€ DVWA                    β”‚   β”‚
β”‚  β”‚   β”œβ”€ WebGoat                 β”‚   β”‚
β”‚  β”‚   └─ VulnHub VMs             β”‚   β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Step 1: Install Virtualization Software

Download:

Verify Installation:

Option B: VMware Workstation Player (FREE for Personal Use)

Download: https://www.vmware.com/products/workstation-player.html

Option C: VMware Fusion (macOS - Free for Personal Use)

Download: https://www.vmware.com/products/fusion.html


Step 2: Download Kali Linux VM

Pre-built VM (Fastest - 15 minutes)

Download:

Extract and Import:

Default Credentials:

Manual Installation (Customizable - 45 minutes)

If you want to customize:

  1. Download Kali ISO: https://www.kali.org/get-kali/#kali-installer-images

  2. Create new VM in VirtualBox

  3. Allocate: 4GB RAM, 2 CPU cores, 80GB disk

  4. Boot from ISO and install


Step 3: Configure Kali Linux

First Boot Setup

1. Update System:

2. Install Essential Tools:

3. Install Burp Suite Community Edition:

4. Configure Burp Proxy:

5. Install Additional Tools:


Step 4: Set Up Vulnerable Targets

Target 1: OWASP Juice Shop (Web App)

What: Modern vulnerable web application Vulnerabilities: OWASP Top 10, business logic flaws Best For: Beginners to advanced

Installation (Docker):

Hacking Challenges:

  • SQL Injection (login bypass)

  • XSS (stored, reflected, DOM)

  • Authentication bypass

  • Business logic flaws

  • XXE injection

Target 2: DVWA (Damn Vulnerable Web App)

What: Classic vulnerable PHP application Vulnerabilities: SQLi, XSS, CSRF, File Upload Best For: Learning basics

Installation:

Difficulty Levels:

  • Low: Vulnerable code (learn the basics)

  • Medium: Some sanitization (learn bypasses)

  • High: Secure code (learn what good looks like)

Target 3: WebGoat

What: OWASP learning platform Best For: Structured learning path

Installation:

Target 4: VulnHub VMs

What: Downloadable vulnerable machines Best For: Full system compromise practice

Popular VMs:

  • Mr. Robot (Easy) - Based on TV show

  • Metasploitable 2 (Medium) - Multiple services

  • Kioptrix Level 1 (Easy) - Classic beginner VM

Setup:

  1. Download from: https://www.vulnhub.com/

  2. Import .ova into VirtualBox

  3. Set network to "Internal Network"

  4. Find IP with netdiscover or nmap


Step 5: Network Configuration

Isolate Your Lab (Security!)

Why:

  • Prevents accidental scanning of your real network

  • Keeps vulnerable machines contained

  • Allows safe exploitation

VirtualBox Setup:

Verify Isolation:


Step 6: First Hacking Session

Let's Hack Juice Shop!

Goal: Find 5 vulnerabilities

1. Login Bypass (SQL Injection)

2. XSS (Stored)

3. Find Admin Panel

4. Access FTP

5. Business Logic Flaw


Daily Practice Routine

30-Minute Practice Session

Weekly Goals

Week 1:

Week 2:

Week 3:

Week 4:


Pro Tips

πŸ’‘ Tip #1: Take Screenshots

πŸ’‘ Tip #2: Keep Notes

πŸ’‘ Tip #3: Snapshot VMs

πŸ’‘ Tip #4: Backup Your Progress

πŸ’‘ Tip #5: Join Communities

  • Discord: Bug Bounty Hunter Methodology

  • Reddit: r/bugbounty

  • Telegram: https://t.me/bugbounty_tech


Troubleshooting

Problem: Can't Access Targets

Problem: Burp Suite Not Working

Problem: VM Won't Start


Resources

Learning Platforms

  • PortSwigger Web Security Academy (FREE)

  • Hack The Box Academy (FREE tier)

  • TryHackMe (FREE tier)

  • Cybrary (FREE courses)

Practice Targets

  • OWASP Juice Shop

  • DVWA

  • WebGoat

  • VulnHub

  • Hack The Box

  • TryHackMe

Tools Reference

  • Kali Tools: https://www.kali.org/tools/

  • Bug Bounty Toolkit: https://github.com/ZephrFish/BugBountyToolkit


Next Steps

After completing this guide:

  1. βœ… Practice daily (even 30 minutes helps!)

  2. βœ… Complete all Juice Shop challenges

  3. βœ… Solve 3 VulnHub VMs

  4. βœ… Learn one new tool per week

  5. βœ… Join bug bounty communities

  6. βœ… Read disclosed reports on HackerOne

  7. βœ… Start with safe programs (VDP)

Remember: Every expert was once a beginner. Your lab is where you build the skills that earn real bounties!


Published: 2024-02-29 Last Updated: 2024-02-29 Target Audience: Beginners Author: CipherOps Team


Lab set up? Share your progress with us on Telegramarrow-up-right!

Last updated