# Section 1: Pre-Game

- [Chapter 1: Infrastructure](/my-notes/bug-bounty-playbook-1/section-1-pre-game/chapter-1-infrastructure.md): setting up infrastructure and tooling before starting hacking like getting your VPS, downloading kali to a VM, installing all of your  tools, buying all of your API keys
- [Chapter 2: Organization](/my-notes/bug-bounty-playbook-1/section-1-pre-game/chapter-2-organization.md): Have clear records and notes of what has been learned and done
- [Chapter 3: Knowledge Base](/my-notes/bug-bounty-playbook-1/section-1-pre-game/chapter-3-knowledge-base.md): keep knowledge base up to date.
- [Chapter 4: Bug bounty 101](/my-notes/bug-bounty-playbook-1/section-1-pre-game/chapter-4-bug-bounty-101.md): Picking the Platform
- [Chapter 5: Methodology - Workflows](/my-notes/bug-bounty-playbook-1/section-1-pre-game/chapter-5-methodology-workflows.md): The easiest way to map out your pentest, bug bounty, or hacking process is to create a flowchart or workflow that describes everything
