8000 format fixes · csit-github/docs.hackerone.com@c723af1 · GitHub
[go: up one dir, main page]

Skip to content

Commit c723af1

Browse files
committed
format fixes
1 parent 4d9789f commit c723af1

File tree

1 file changed

+1
-8
lines changed

1 file changed

+1
-8
lines changed

docs/hackers/hacker-sucess-guide.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -24,14 +24,7 @@ New to hacking or want to sharpen your skills? We’ve created this leveling up
2424
* For starters, we suggest: IBM, GM, DoD, and Verizon Media as good programs to start with.
2525
10. Start hacking and apply all that you’ve learned from Hacker101.
2626

27-
> **Helpful tips:** Keep in mind that there are a lot of differences between hacking in the CTF and hacking in an actual bug bounty program. We understand that the scope is much larger when hacking in a live program, and that it’s hard figuring out where to start or look, but we encourage you to just keep practicing. Here are some recommended reads and resources that may help in your journey to hacking:
28-
* *Web Hacking 101* by Peter Yaworski
29-
* *The Web Application Hacker's Handbook* by Dafydd Stuttard and Marcus Pinto
30-
* *The Hacker Playbook 2: Practical Guide To Penetration Testing* by Peter Kim
31-
* *Hacking: The Art of Exploitation* by Jon Erickson
32-
* *The Basics of Hacking and Penetration Testing* by Patrick Engebretson
33-
* *RTFM: Red Team Field Manual* by Ben Clark
34-
* Frans Rosen provides some insight as to how to win over security teams and gain influence as a hacker on https://hackerone.com/fransvisitsvegas.
27+
> **Helpful tips:** Keep in mind that there are a lot of differences between hacking in the CTF and hacking in an actual bug bounty program. We understand that the scope is much larger when hacking in a live program, and that it’s hard figuring out where to start or look, but we encourage you to just keep practicing. Here are some recommended reads and resources that may help in your journey to hacking: <br>* *Web Hacking 101* by Peter Yaworski<br>* *The Web Application Hacker's Handbook* by Dafydd Stuttard and Marcus Pinto <br>* *The Hacker Playbook 2: Practical Guide To Penetration Testing* by Peter Kim <br>* *Hacking: The Art of Exploitation* by Jon Erickson <br>* *The Basics of Hacking and Penetration Testing* by Patrick Engebretson <br>* *RTFM: Red Team Field Manual* by Ben Clark <br>* Frans Rosen provides some insight as to how to win over security teams and gain influence as a hacker on https://hackerone.com/fransvisitsvegas.
3528
3629
11. [Submit a report](submitting-reports.html) once you’ve found a vulnerability. Submitting valid reports is important for building up your [Reputation](reputation.html), [Signal and Impact](signal-and-impact.html).
3730
* Here’s a guide on what constitutes a [quality report](quality-reports.html).

0 commit comments

Comments
 (0)
0