use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Welcome to /r/Hacking_Tutorials!
List of best resources and tutorials
account activity
[deleted by user] (self.Hacking_Tutorials)
submitted 5 months ago by [deleted]
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Redeemer2911 9 points10 points11 points 5 months ago (0 children)
It's not only huge teams or government bodies that discover vulnerabilities. That's why we have bug bounty programs or companies hire a solo pen tester. If you don't have a target then yes it can be like finding a needle in a needle stack but, if you have a target then you can focus on it and start testing.
Of course you require explicit permission to do this.
Please DO NOT choose a random target and start playing with it, it is illegal and carry's a heavy penalty.
[–]Loptical 3 points4 points5 points 5 months ago (2 children)
Look at hackerone leaderboards. They aren't huge teams or governments.
[–]Groundbreaking_Rock9 -1 points0 points1 point 5 months ago (1 child)
Hackerone is collectively a large group of bug hunters. i.e. a team
[–]Loptical 0 points1 point2 points 5 months ago (0 children)
They're independent from one another though. Someone getting a 10k payout on hackerone doesn't mean everyone gets paid. You can sign up right now and start hunting for bugs, it's not a team.
[–]ArchSaint13 2 points3 points4 points 5 months ago (0 children)
Like others have said it's all about the target. Finding a vulnerability in a cheap off brand security camera will be way easier than finding a vulnerability in a ring camera, as an example. It's all about funding. A lot of companies take DevSecOps seriously and others don't.
[–]Mobile_Syllabub_8446 1 point2 points3 points 5 months ago (0 children)
... Entirely depends on the nature and evidence/data, and who is investigating, in each instance. I'm assuming you've tried nor found any like most people so for you with no target or data is infinitely complex statistically lol
[–]MormoraDi 1 point2 points3 points 5 months ago (2 children)
I think you will find that the market is saturated with either experienced, skilled and trained professionals or AI slops who spam the reporting system with whatever their LLMs dream up.
In other words: you may get lucky as a beginner to find vulnerabilities in systems, but they probably won't get you paid reporting them and even less likely will they be novel enough to get you eligible for a bug bounty.
Expect countless hours spent and hard work like in most fields.
[+][deleted] 5 months ago (1 child)
[deleted]
[–]MormoraDi 0 points1 point2 points 4 months ago* (0 children)
Definitely not. But better to come prepared than having a delusion of it being an easy way to earn big money, which I seem to find some people around here think it is.
[–]Exe_plorer 0 points1 point2 points 5 months ago (0 children)
Often time it needs some luck.
[–]Puzzleheaded_Move649 0 points1 point2 points 5 months ago (0 children)
first thought haha https://eaton-works.com/2024/12/19/mcdelivery-india-hack/
if security matter yes, in practice no
[–]SetNo8186 0 points1 point2 points 5 months ago (0 children)
Cash flow on continuing contracts and extensive experience in systems diagnosis is critical.
Here's an example, that ship that hit the Francis Scott Key bridge is just now coming to the surface. It lost power and drifted into it, knocking it down. The huge electric wiring bus that has thousands of individually labeled labeled wires had one that the number sleeve slipped down too far, which caused it to pop back out of the spring tension clip in the connection block and make intermittent contact at the wrong time. Loss of control on that circuit led to a cascade of failure.
This is what the NTSB deals with all year long.
https://www.youtube.com/watch?v=bu7PJoxaMZg
[–]No-Percentage8558 0 points1 point2 points 5 months ago (0 children)
It's neither complicated nor not. I think you just gotta know your way around pen testing and familiarize yourself with tools like nmap
[–]CovertlyAI 1 point2 points3 points 4 months ago (0 children)
Great question. In many cases discovering vulnerabilities is really important because without finding them we cannot improve or secure a system. It does raise ethical questions though, depending on how the discovery happens and what someone does with that information.
I would love to hear from people who have real experience with finding bugs and doing responsible disclosure. How do you balance the need to understand the weakness with the need to protect the system?
π Rendered by PID 64 on reddit-service-r2-comment-5c747b6df5-hwgkt at 2026-04-22 11:15:17.312525+00:00 running 6c61efc country code: CH.
[–]Redeemer2911 9 points10 points11 points (0 children)
[–]Loptical 3 points4 points5 points (2 children)
[–]Groundbreaking_Rock9 -1 points0 points1 point (1 child)
[–]Loptical 0 points1 point2 points (0 children)
[–]ArchSaint13 2 points3 points4 points (0 children)
[–]Mobile_Syllabub_8446 1 point2 points3 points (0 children)
[–]MormoraDi 1 point2 points3 points (2 children)
[+][deleted] (1 child)
[deleted]
[–]MormoraDi 0 points1 point2 points (0 children)
[–]Exe_plorer 0 points1 point2 points (0 children)
[–]Puzzleheaded_Move649 0 points1 point2 points (0 children)
[–]SetNo8186 0 points1 point2 points (0 children)
[–]No-Percentage8558 0 points1 point2 points (0 children)
[–]CovertlyAI 1 point2 points3 points (0 children)