BeginnerWeb SecurityBug BountyOffensive

Bug Bounty Bootcamp

The Guide to Finding and Reporting Web Vulnerabilities

4 / 5

Vickie Li's pragmatic walk through the bug-bounty workflow, from picking a program and recon to reporting findings that actually pay out.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Authors
Vickie Li
Published
2021
Publisher
No Starch Press
Pages
416
Language
English

Read this if

Readers who want a workflow-first introduction to bug bounty. Li covers recon, methodology, the bug classes that pay, automation, and reports, all in the order you'd actually do them.

Skip this if

Practitioners who already work in offensive security or who want depth on individual bug classes. The book is a wide first pass, not a deep specialization.

Key takeaways

  • The recon chapter (subdomains, GitHub leaks, archived endpoints) alone justifies the book; most beginners skip recon and miss most of the bounty.
  • The chapters on race conditions and business logic flaws cover bug classes that don't show up in older textbooks but pay regularly today.
  • Li's writing on reports, triage interaction, and disclosure ethics is the calmest and most professional section in the bug-bounty book market.

Notes

Pair with Real-World Bug Hunting (Yaworski) for the case-studies side and with Hacking APIs (Ball) once you start seeing API-only programs. Li's blog at vickieli.dev is excellent and comes with the same temperament as the book. If we had to recommend one entry point to bug bounty in 2026, this is currently the one.