Member-only story

My Hacking Journey Part 3: NPC to Security Researcher with a simple 3 Stage Process

9 min readMay 21, 2023
Photo by Markus Spiske on Unsplash

Hello! and Welcome to this last part of the blog!

In this blog post, I will be sharing my approach towards learning VAPT, Bug Bounty hunting, & playing CTF “The 3-Stage Process” and I hope it will be useful to you guys as well to start your hacking journey. So, Without further ado, let’s swiftly plunge into this 3-stage process and have some fun!

Before we jump into this 3 stage process, I must emphasize that ethical hacking is a delightfully individual journey. No cookie-cutter solutions here, folks! What works wonders for someone may not tickle your fancy in the same way. Nevertheless, fear not, for I’ve concocted a beginner-friendly process that has tickled my funny bone and still proving fruitful. So grab yourself a steaming cup of coffee, get comfy as a cat on a fluffy pillow, and let’s embark on this wild adventure of Web/API Hacking (i.e. Application Hacking) together!

Photo by Caleb Woods on Unsplash

Stage 1: Mundane but Vitalicious…

--

--

Hackergod00001
Hackergod00001

Written by Hackergod00001

I am Upmanyu Jha AKA Hackergod00001, a CS Graduate, Noob Security Researcher, Developer, Content Creator & founder @HAWK-i Security Community.

No responses yet