Squashing My First Bug: How I Got Paid for Breaking Things

Featured image

I’ve been into cybersecurity for as long as I can remember. Back when it wasn’t even called cybersecurity, I was that kid poking around computers, breaking things (sometimes on purpose, sometimes not), and figuring out how to put them back together usually with more knowledge and a slightly higher risk tolerance.

One of my absolute favorite things to do these days is listen to cybersecurity podcasts. There’s something oddly satisfying about hearing stories of hackers, exploits, and vulnerabilities while sipping my morning coffee. It’s like true crime, but for tech nerds.


The Bug That Changed Everything

One day, while deep into a podcast, I heard someone mention a path interception bug a sneaky little flaw that could lead to privilege escalation and persistence. They described in detail how the bug worked, what to look for, and how you could detect it.

And that was it. Curiosity activated.

I couldn’t wait to see if I could find something like this in the real world. Not in some controlled lab, not in a CTF, but in actual, functioning software.


Testing It Out (a.k.a. Breaking My Work Computer for Science)

Armed with my newfound knowledge, I decided to try it on my own work PC ethically, of course. I followed the steps they described, ran a few tests, and…

💥 Boom. Security concern detected. 💥

At first, I had that moment of disbelief. Wait. Did I actually just find something? I mean, sure, I’ve always loved security, but wasn’t this the kind of thing only super elite hackers did? The kind of people who wear hoodies in dark rooms and type really fast while dramatic music plays in the background?

Surely, I wasn’t one of those people.

But the evidence was staring me in the face: I had found a legitimate security issue.


From Discovery to Bug Bounty

I had heard about bug bounties from my many hours of podcast listening, but I always thought they were reserved for hackers with years of experience, custom-built toolkits, and a secret handshake only the elite knew.

Turns out, the only real requirement is curiosity and willingness to try.

So, I did some quick research on how to write a bug report, took a deep breath, and sent an email off to the company.

A few days later, I got a response:

“This is indeed a critical security vulnerability. We’ve confirmed the issue, and we’d like to reward you with $1,000.”

I just sat there, staring at the email. I actually did it.


What I Learned (Besides That Bug Bounties Are Awesome)

The biggest lesson I took away from this?

👉 You don’t need to be an “elite hacker” to find and report security flaws.
👉 You don’t need years of experience.
👉 You just need curiosity, a willingness to learn, and the courage to try.

If I had let imposter syndrome win if I had convinced myself that I wasn’t “good enough” to report a vulnerability I never would have had this experience.

So if you’re new to cybersecurity, or just starting to dip your toes into bug bounty hunting, keep going. Be curious. Be willing to learn. And most importantly, don’t be afraid to break things (ethically, of course).

Because sometimes, breaking things the right way gets you paid. 💰💻


🔥 Thinking about getting into bug bounties?
Drop a comment if you’ve ever found a vulnerability, or if you’re on the fence about trying bug bounties yourself! 🚀