Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 8b164ef

Browse files
committed
bullet fixes
1 parent c723af1 commit 8b164ef

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/hackers/hacker-sucess-guide.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ New to hacking or want to sharpen your skills? We’ve created this leveling up
2727
> **Helpful tips:** Keep in mind that there are a lot of differences between hacking in the CTF and hacking in an actual bug bounty program. We understand that the scope is much larger when hacking in a live program, and that it’s hard figuring out where to start or look, but we encourage you to just keep practicing. Here are some recommended reads and resources that may help in your journey to hacking: <br>* *Web Hacking 101* by Peter Yaworski<br>* *The Web Application Hacker's Handbook* by Dafydd Stuttard and Marcus Pinto <br>* *The Hacker Playbook 2: Practical Guide To Penetration Testing* by Peter Kim <br>* *Hacking: The Art of Exploitation* by Jon Erickson <br>* *The Basics of Hacking and Penetration Testing* by Patrick Engebretson <br>* *RTFM: Red Team Field Manual* by Ben Clark <br>* Frans Rosen provides some insight as to how to win over security teams and gain influence as a hacker on https://hackerone.com/fransvisitsvegas.
2828
2929
11. [Submit a report](submitting-reports.html) once you’ve found a vulnerability. Submitting valid reports is important for building up your [Reputation](reputation.html), [Signal and Impact](signal-and-impact.html).
30-
* Here’s a guide on what constitutes a [quality report](quality-reports.html).
31-
* You can look at [hacktivity](https://hackerone.com/hacktivity?order_field=popular) and past reports to understand what security teams look for in a quality report.
30+
* Here’s a guide on what constitutes a [quality report](quality-reports.html).
31+
* You can look at [hacktivity](https://hackerone.com/hacktivity?order_field=popular) and past reports to understand what security teams look for in a quality report.
3232

33-
Once you’ve submitted your first report, the security analyst will review, assess, and validate it. They will typically respond with questions and comments. As security teams handle many reports, it may take a little while to respond back to your report. We recommend giving teams at least a week before asking for updates. While you’re waiting to hear back, we encourage you to keep on hacking and to check out other programs.
33+
Once you’ve submitted your first report, the security analyst will review, assess, and validate it. They will typically respond with questions and comments. As security teams handle many reports, it may take a little while to respond back to your report. We recommend giving teams at least a week before asking for updates. While you’re waiting to hear back, we encourage you to keep on hacking and to check out other programs.
3434

3535
Happy hacking!

0 commit comments

Comments
 (0)