SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
The Game of Bug Bounty
Hunting
Money, Drama, Action and Fame
By,
Abhinav Mishra | 0ctac0der
Let’s get a bit friendly first
Me?
Abhinav Mishra | @0ctac0der | Bug Bounty Hunter | Freelancer . Have Quest?
And you?
Name? | What are you? | Security Exp? | Bug Hunter?
In the meantime, copy the content to your laptops. Install VirtualBox and copy the Kali ISO. Run Kali
Linux as a virtual machine. Help your neighbors (yes, this applies even if he is a guy)
What’s on the plate?
● All you need to know about bug bounty and platforms
○ History & present | Who can do it? What are the skill needed? Where to start from?
○ About Hackerone. | About BugCrowd.
○ Penetration Testing and Bug Bounties
● Need Some Motivation?
○ How much money are we talking about? MONEY
○ Where do you stand? Where do I stand?
● Bug Hunter’s Avenue
○ How do I do it? Building your approach?
○ Choose your Goose (to get golden eggs) and Let’s do it …. ACTION
○ Resources and Tools I use (suggest), Blogs and People to follow
● Best submissions H1 (those I love ) Fame
● Dark Side: Mishaps, Blunders and some (ugly) famous reports :) - DRAMA
Bug Bounties
What is it? Hack → Report → Get Paid
History of Bug Bounties:
Read more & Image credit : https://cobalt.io/blog/the-history-of-bug-bounty-programs/
Present Status of Bug Bounty Programs
● Most Famous Platforms:
○ HackerOne - Founded in 2012
○ BugCrowd - Founded in 2012
● Worldwide 488+ Public Programs (as per BugCrowd List)
● What you get? Cash | Bitcoins | Swag | Hall Of Fame
● Who can participate?
○ Technically? Anyone.
● What are the skills required?
○ Web/Mobile/Infra hacking skills, reporting skills, sharp mind, out of the “room” thinking (because
the box is too small)
● Where to start?
○ Process is very simple. Register to BB platforms → Choose program → Hack → Report
Lifecycle of Bug Bounty Submission
About HackerOne, BugCrowd & Public programs
● Two most popular Bug Bounty Platforms.
● Provide a great platform for white hats to sharpen the skills and earn cash.
● Public and Private programs to participate.
● Individual bug bounty platforms: Facebook, Google, Microsoft.
● List of all bug bounty programs:
○ BugCrowd Maintained List
○ FireBounty List
● Openbugbounty : Link
Bug Bounty Motivation #1 (Money)
Let’s have a tea break… 10 min.
If we started at right time, it should be 11.45 AM now.
Approach
What To Do
● The earlier, the better
● Be the user first
● Understand the logic, to break it
● Have custom methods, payloads
● Not just XSS, CSRF, IDOR, SQLi…
● Reporting is the money multiplier
● Be professional
What Not To Do
● XSS : ctrl c → ctrl v everywhere
● Low fruits are never the best
● The easy way is not the right way
● Half filled submissions
● Only OWASP Top 10?
● Irresponsible in responsible
disclosures.
● Don’t do #Beg-Bounty
Enough. So what next?
Next 1 Hour:
● Exploring the scope of a program. Building the approach.
● Lookout for low hanging fruits.
● Some cool tricks to speed up the hunting
● Tools and scripts which might help
● Reporting .. how to do this?
● Attack scenario and Exploit
After that (for 0.5 Hours):
● Choose your target
● Hunt for bugs, let’s see who is going to buy us a drink.
Action Begins Here...
● Exploring the scope
○ Read the “Rules of Engagement” and “Program Description”
○ Knockpy www.mydomain.com or Recon-ng Link
○ If scope is “*.mydomain.com” then do “Inurl:mydomain.com -www”
○ Mobile apps? Reverse engg to find URLs.
○ Mobile websites… https://m.mydomain.com
● Port scan, service detection & low hanging fruits
○ Do not miss the server
■ Port scanning: nmap is your buddy nmap -sS -A -PN -p mydomain.com
○ Publicly accessible grails console, fuzz for hidden files or insecure urls.
■ Wfuzz, google
Low hanging fruits….
Remember everyone is looking for it, but the only the one wins.
● Finding XSS
○ - Inject to find XSS Link
○ - Unicode transformation issues- By @tbmnull - PDF here
● CSRF: (Ref: https://whitton.io/)
Low hanging fruits…. Chase #2
● SSL issues (SSLscan),
● Wordpress bugs (WPScan)
○ Wpscan --url “www.mydomain.com/blog”
● Fuzzing (Wfuzz)
○ Wfuzz -c -z file,”SecList” --hc 404 https://www.mydomain.com/admin/FUZZ
● Session related vulnerabilities
○ Fixation, Reuse, Expiration
○ Insecure cookies, no account lockouts
○ Password reset bugs: token reuse, token generation etc.
○ Auto session logout on all devices? And mobile app?
○ Account enumeration, Clickjacking, Info disclosures
Bug Bounty Motivation #2
Let’s have a tea break… 10 min.
If we started at right time, it should be 1.30 PM now.
Slightly higher
● SQLi | Sample report: Link
● Insecure direct object reference (Game of “Eena Meena Deeka“) | Sample
report: Link
● XXE vulnerabilities | Sample report: Link (My personal fav)
● Remote code execution | Sample report: Link
● Priv Esc or Authorization bypass | Sample report: HackerOne Link
● Server Side request forgery (SSRF) | Sample report: HackerOne Link
● HTTP response splitting | Sample report: HackerOne Link
Out of the “room” findings (Fame)
Refer these incredible findings:
● Uber Bug Bounty: Turning Self-XSS into Good-XSS : Link
● How I hacked Hotmail : Link
● Command injection which got me "6000$" from #Google : Link
● Content Types and XSS: Facebook Studio : Link
Time is the “BOSS”
Any specific vulnerability that you want to know how to hunt?
Bug Bounty Motivation #3
Let’s have a tea break… 10 min.
If we started at right time, it should be 2.45 PM now.
Choose your Goose (for golden eggs)
What now? (30 Min)
● Register on any platform (BugCrowd or HackerOne) or Choose a public
program if you want.
● Hunt for bugs.
● Ask questions. Push yourself to go beyond just salary :)
At the same time:
● Follow the bounty rules.
● Follow the responsible disclosures. Do not public the bug (if you get lucky).
● Reporting is the hidden secret.
Bug Bounty Motivation #4
Let’s have a tea break… 10 min.
If we started at right time, it should be 3.30 PM now.
The Dark side (Drama)
Case 1. The unexpected “Facebook” and an over-curious hacker.
The story from Wes’s point of view: Link
The Dark side Part 2
Case 2. A desperate, unprofessional, greedy, abusive report, deserve this.
Where to go next?
Resources:
● How to become a Bug Bounty Hunter (BugCrowd)
● Researcher Resources - Tutorials (BugCrowd)
● The Bug Hunters Methodology (Jason Haddix)
● Researcher Resources - Tutorials (BugCrowd)
Public Bug Reports:
● Bug Bounty POC. All Bug Bounty POC write ups by Security Researchers. Link
● the unofficial HackerOne disclosure timeline. (HackerOne Reports) Link
● Public Pentest reports : Link
Where to go next?
Blogs to Follow:
● BugCrowd Blog
● HackerOne Blog
● Jack Whitton’s Blog
● Hack 2 Learn. Master the art of Cross Site Scripting. Brute Logic’s Blog
● Bug Bounty Findings by Meals. Meal’s Blog
Remember, all the resources, tools, blogs, examples shown by me in this session are one of those
hundreds (if not thousand) which are there on internet. The best way to find is, do not remain AFK
"Computers are useless. They can only give you answers."
- Pablo Picasso
If we started at right
time, it should be 4 PM
now.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Saying Hello to Bug Bounty
Saying Hello to Bug BountySaying Hello to Bug Bounty
Saying Hello to Bug Bounty
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki ChidaIDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
 
SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug Bounties
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing Techniques
 
Bug Bounty Programs For The Web
Bug Bounty Programs For The WebBug Bounty Programs For The Web
Bug Bounty Programs For The Web
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Neat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protectionNeat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protection
 
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Deep dive into ssrf
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodology
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!
 
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Hackfest presentation.pptx
Hackfest presentation.pptxHackfest presentation.pptx
Hackfest presentation.pptx
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
 

Semelhante a The Game of Bug Bounty Hunting - Money, Drama, Action and Fame

ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
Santhosh Tuppad
 
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOMENegative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
jeffmcjunkin
 

Semelhante a The Game of Bug Bounty Hunting - Money, Drama, Action and Fame (20)

Fun & profit with bug bounties
Fun & profit with bug bountiesFun & profit with bug bounties
Fun & profit with bug bounties
 
My Bug Hunting With Open Source
My Bug Hunting With Open SourceMy Bug Hunting With Open Source
My Bug Hunting With Open Source
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi ChapterAndroid "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
 
Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into It
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
 
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security TeamSecrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud Presentation
 
Find my tea [sync ipswich] a technical journey through new product development
Find my tea [sync ipswich] a technical journey through new product developmentFind my tea [sync ipswich] a technical journey through new product development
Find my tea [sync ipswich] a technical journey through new product development
 
On hacking & security
On hacking & security On hacking & security
On hacking & security
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties
 
Ncc hackers session 4
Ncc hackers session 4Ncc hackers session 4
Ncc hackers session 4
 
How to contribute back to Open Source
How to contribute back to Open SourceHow to contribute back to Open Source
How to contribute back to Open Source
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
brighton final.pptx
brighton final.pptxbrighton final.pptx
brighton final.pptx
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOMENegative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 

Mais de Abhinav Mishra (6)

Insecure direct object reference (null delhi meet)
Insecure direct object reference (null delhi meet)Insecure direct object reference (null delhi meet)
Insecure direct object reference (null delhi meet)
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
The art of android hacking
The art of  android hackingThe art of  android hacking
The art of android hacking
 
Android Security Basics
Android Security BasicsAndroid Security Basics
Android Security Basics
 
How not to make a hacker friendly application
How not to make a hacker friendly applicationHow not to make a hacker friendly application
How not to make a hacker friendly application
 
Anatomizing online payment systems: hack to shop
Anatomizing online payment systems: hack to shopAnatomizing online payment systems: hack to shop
Anatomizing online payment systems: hack to shop
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

The Game of Bug Bounty Hunting - Money, Drama, Action and Fame

  • 1. The Game of Bug Bounty Hunting Money, Drama, Action and Fame By, Abhinav Mishra | 0ctac0der
  • 2. Let’s get a bit friendly first Me? Abhinav Mishra | @0ctac0der | Bug Bounty Hunter | Freelancer . Have Quest? And you? Name? | What are you? | Security Exp? | Bug Hunter? In the meantime, copy the content to your laptops. Install VirtualBox and copy the Kali ISO. Run Kali Linux as a virtual machine. Help your neighbors (yes, this applies even if he is a guy)
  • 3. What’s on the plate? ● All you need to know about bug bounty and platforms ○ History & present | Who can do it? What are the skill needed? Where to start from? ○ About Hackerone. | About BugCrowd. ○ Penetration Testing and Bug Bounties ● Need Some Motivation? ○ How much money are we talking about? MONEY ○ Where do you stand? Where do I stand? ● Bug Hunter’s Avenue ○ How do I do it? Building your approach? ○ Choose your Goose (to get golden eggs) and Let’s do it …. ACTION ○ Resources and Tools I use (suggest), Blogs and People to follow ● Best submissions H1 (those I love ) Fame ● Dark Side: Mishaps, Blunders and some (ugly) famous reports :) - DRAMA
  • 4. Bug Bounties What is it? Hack → Report → Get Paid History of Bug Bounties: Read more & Image credit : https://cobalt.io/blog/the-history-of-bug-bounty-programs/
  • 5. Present Status of Bug Bounty Programs ● Most Famous Platforms: ○ HackerOne - Founded in 2012 ○ BugCrowd - Founded in 2012 ● Worldwide 488+ Public Programs (as per BugCrowd List) ● What you get? Cash | Bitcoins | Swag | Hall Of Fame ● Who can participate? ○ Technically? Anyone. ● What are the skills required? ○ Web/Mobile/Infra hacking skills, reporting skills, sharp mind, out of the “room” thinking (because the box is too small) ● Where to start? ○ Process is very simple. Register to BB platforms → Choose program → Hack → Report
  • 6. Lifecycle of Bug Bounty Submission
  • 7. About HackerOne, BugCrowd & Public programs ● Two most popular Bug Bounty Platforms. ● Provide a great platform for white hats to sharpen the skills and earn cash. ● Public and Private programs to participate. ● Individual bug bounty platforms: Facebook, Google, Microsoft. ● List of all bug bounty programs: ○ BugCrowd Maintained List ○ FireBounty List ● Openbugbounty : Link
  • 8. Bug Bounty Motivation #1 (Money) Let’s have a tea break… 10 min. If we started at right time, it should be 11.45 AM now.
  • 9. Approach What To Do ● The earlier, the better ● Be the user first ● Understand the logic, to break it ● Have custom methods, payloads ● Not just XSS, CSRF, IDOR, SQLi… ● Reporting is the money multiplier ● Be professional What Not To Do ● XSS : ctrl c → ctrl v everywhere ● Low fruits are never the best ● The easy way is not the right way ● Half filled submissions ● Only OWASP Top 10? ● Irresponsible in responsible disclosures. ● Don’t do #Beg-Bounty
  • 10. Enough. So what next? Next 1 Hour: ● Exploring the scope of a program. Building the approach. ● Lookout for low hanging fruits. ● Some cool tricks to speed up the hunting ● Tools and scripts which might help ● Reporting .. how to do this? ● Attack scenario and Exploit After that (for 0.5 Hours): ● Choose your target ● Hunt for bugs, let’s see who is going to buy us a drink.
  • 11. Action Begins Here... ● Exploring the scope ○ Read the “Rules of Engagement” and “Program Description” ○ Knockpy www.mydomain.com or Recon-ng Link ○ If scope is “*.mydomain.com” then do “Inurl:mydomain.com -www” ○ Mobile apps? Reverse engg to find URLs. ○ Mobile websites… https://m.mydomain.com ● Port scan, service detection & low hanging fruits ○ Do not miss the server ■ Port scanning: nmap is your buddy nmap -sS -A -PN -p mydomain.com ○ Publicly accessible grails console, fuzz for hidden files or insecure urls. ■ Wfuzz, google
  • 12. Low hanging fruits…. Remember everyone is looking for it, but the only the one wins. ● Finding XSS ○ - Inject to find XSS Link ○ - Unicode transformation issues- By @tbmnull - PDF here ● CSRF: (Ref: https://whitton.io/)
  • 13. Low hanging fruits…. Chase #2 ● SSL issues (SSLscan), ● Wordpress bugs (WPScan) ○ Wpscan --url “www.mydomain.com/blog” ● Fuzzing (Wfuzz) ○ Wfuzz -c -z file,”SecList” --hc 404 https://www.mydomain.com/admin/FUZZ ● Session related vulnerabilities ○ Fixation, Reuse, Expiration ○ Insecure cookies, no account lockouts ○ Password reset bugs: token reuse, token generation etc. ○ Auto session logout on all devices? And mobile app? ○ Account enumeration, Clickjacking, Info disclosures
  • 14. Bug Bounty Motivation #2 Let’s have a tea break… 10 min. If we started at right time, it should be 1.30 PM now.
  • 15. Slightly higher ● SQLi | Sample report: Link ● Insecure direct object reference (Game of “Eena Meena Deeka“) | Sample report: Link ● XXE vulnerabilities | Sample report: Link (My personal fav) ● Remote code execution | Sample report: Link ● Priv Esc or Authorization bypass | Sample report: HackerOne Link ● Server Side request forgery (SSRF) | Sample report: HackerOne Link ● HTTP response splitting | Sample report: HackerOne Link
  • 16. Out of the “room” findings (Fame) Refer these incredible findings: ● Uber Bug Bounty: Turning Self-XSS into Good-XSS : Link ● How I hacked Hotmail : Link ● Command injection which got me "6000$" from #Google : Link ● Content Types and XSS: Facebook Studio : Link
  • 17. Time is the “BOSS” Any specific vulnerability that you want to know how to hunt?
  • 18. Bug Bounty Motivation #3 Let’s have a tea break… 10 min. If we started at right time, it should be 2.45 PM now.
  • 19. Choose your Goose (for golden eggs) What now? (30 Min) ● Register on any platform (BugCrowd or HackerOne) or Choose a public program if you want. ● Hunt for bugs. ● Ask questions. Push yourself to go beyond just salary :) At the same time: ● Follow the bounty rules. ● Follow the responsible disclosures. Do not public the bug (if you get lucky). ● Reporting is the hidden secret.
  • 20. Bug Bounty Motivation #4 Let’s have a tea break… 10 min. If we started at right time, it should be 3.30 PM now.
  • 21. The Dark side (Drama) Case 1. The unexpected “Facebook” and an over-curious hacker. The story from Wes’s point of view: Link
  • 22. The Dark side Part 2 Case 2. A desperate, unprofessional, greedy, abusive report, deserve this.
  • 23. Where to go next? Resources: ● How to become a Bug Bounty Hunter (BugCrowd) ● Researcher Resources - Tutorials (BugCrowd) ● The Bug Hunters Methodology (Jason Haddix) ● Researcher Resources - Tutorials (BugCrowd) Public Bug Reports: ● Bug Bounty POC. All Bug Bounty POC write ups by Security Researchers. Link ● the unofficial HackerOne disclosure timeline. (HackerOne Reports) Link ● Public Pentest reports : Link
  • 24. Where to go next? Blogs to Follow: ● BugCrowd Blog ● HackerOne Blog ● Jack Whitton’s Blog ● Hack 2 Learn. Master the art of Cross Site Scripting. Brute Logic’s Blog ● Bug Bounty Findings by Meals. Meal’s Blog Remember, all the resources, tools, blogs, examples shown by me in this session are one of those hundreds (if not thousand) which are there on internet. The best way to find is, do not remain AFK
  • 25. "Computers are useless. They can only give you answers." - Pablo Picasso If we started at right time, it should be 4 PM now.