SlideShare uma empresa Scribd logo
1 de 28
SQUASHING
BUGS
Introduction to Bug Bounties
SESSION OUTLINE
 Introduction to Bug Bounties 2:05-2:15
 How to find bugs hands-on 2:15-2:35
 How to use popular bug bounty programs 2:35-2.45
 Case evaluation: Facebook page takeover bug 2:45-2:255
 Conclusions and surprises 2:55 onwards
INTRODUCTION
BUG BOUNTY
 A bug bounty program is a deal offered by many websites and software
developers by which individuals can receive recognition and compensation
for reporting bugs, especially those pertaining to exploits and
vulnerabilities.
 These programs allow the developers to discover and resolve bugs before
the general public is aware of them, preventing incidents of widespread
abuse.
 Bug bounty programs have been implemented by Facebook,Yahoo!,
Google, Reddit, Square and Microsoft.
REWARDS
 Hall of fame(s)
 $$$
 Study grants and scholarships for research
 Recognition
FAQS &
MISCONCEPTIONS I do not have any of those fancy security research tools
 I do not have excellent coding knowledge
 How do I begin and where do I begin?
WHAT YOU NEED
 Be able to read and understand code
 Keep an open eye for different attack possibilities
 Keep updated with the latest attacks and see their POCs (Proof of Concept)
 Differentiate between bugs and false positives
(https://www.facebook.com/notes/facebook-bug-bounty/commonly-
submitted-false-positives/744066222274273 )
 Don’t give up!
FLOW
 Know about bugs! Refer OWASPTop 10
 https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
 Use a testing guide!
 OWASPTesting Project (https://www.owasp.org/images/1/19/OTGv4.pdf )
 Follow researchers and their updates!
FAMOUS
RESEARCHERS http://www.breaksec.com/?page_id=6002
 http://homakov.blogspot.in/
 https://bitquark.co.uk/blog/
 https://nealpoole.com/blog/
 http://nahamsec.com/
 http://stephensclafani.com/
 http://insertco.in/articles
 arunsureshkumar.me
PRACTICE AT
 http://www.dvwa.co.uk/
 https://www.vulnhub.com/
 https://github.com/WebGoat/WebGoat
HANDS ON
Search “Google dorks” to find vulnerable websites. Sample strings:
Inurl:admin_login.php site:.pk
SQL Injection string to be entered in username and password fields: ' or 1=1--
BURP SUITE
 Burp Suite: Burp Suite is an integrated platform for performing security testing of
applications. Its various tools work seamlessly together to support the entire
testing process, from initial mapping and analysis of an application's attack
surface, through to finding and exploiting security vulnerabilities. Burp gives you
full control, letting you combine advanced manual techniques with state-of-the-
art automation, to make your work faster, more effective, and more fun.
 (It is one of the most awesome tools i have ever come across. there are a lot of
features you can use, just make sure you understand each and every function from
burp suite). I’m sure you know all the functionality will make your task way easier
if it is related to security. But be sure to manually validate your findings as it does
report false positives.
Download: http://portswigger.net/burp/download.html
USING BUG BOUNTY
PLATFORMS
FACEBOOK WHITEHAThttps://www.facebook.com/whitehat
HACKERONEhttps://hackerone.com/internet-bug-bounty
GITHUB SECURITYhttps://bounty.github.com/
INTERNET BUG
BOUNTYhttps://internetbugbounty.org/
PAYTMhttps://paytm.com/offer/bug-bounty/
OLAhttps://www.olacabs.com/whitehat
MOBIKWIKhttps://www.mobikwik.com/bug-bounty
OTHERS
 http://bugsheet.com/directory
 https://www.mozilla.org/en-US/security/bug-bounty/
 https://bugcrowd.com/
SOME TERMS USED IN
CLASS
 IDOR: Insecure Direct Object Reference
https://www.owasp.org/index.php/Top_10_2013-A4-
Insecure_Direct_Object_References
 Rate Limiting:
http://www.websecresearch.com/2014/05/a-way-to-bypass-rate-limiting.html
RESOURCES TO SCAN WEBSITES
 https://hackertarget.com/joomla-security-scan/
 https://hackertarget.com/wordpress-security-scan/
 https://hackertarget.com/drupal-security-scan/
 https://pentest-tools.com/website-vulnerability-scanning/discover-hidden-directories-and-files
 https://www.magereport.com/
 https://pentest-tools.com/information-gathering/find-subdomains-of-domain
 http://savanttools.com/test-frame
 https://bugcrowd.com/resources
 https://www.ssllabs.com/ssltest/
 http://www.kitterman.com/spf/validate.html
 https://forum.bugcrowd.com/t/researcher-resources-tools/167
 https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102
RESOURCES
 Tamper Data:Tamper Data is a Firefox Extension which gives you the power to view, record and
even modify outgoing HTTP requests. If you are not familiar with then just take a look at it once, It is
very helpful in identifying the CSRF issues as well as Finding IDOR.
Download: https://addons.mozilla.org/en-US/firefox/addon/tamper-data/
 Live http Headers:To be very frank I rarely use this extension, as it has exactly the same function as
in tamper data the only difference is that, you can capture and reply within the same session.
Download: https://addons.mozilla.org/en-US/firefox/addon/live-http-headers/
 Default user agent switcher: It gives your ability to change your user agent. Basically i use it to find
mobile version of any site.And you may utilize it whenever you want to see the mobile version of
any website. mostly developers host mobile version on m.xyzdomain.com, but sometimes website
load mobile version after detecting the user agent.With this extension you can change user agent as
mobile and view mobile version of the sites.
Download: https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/
 Hackbar: It helps us In SQL as well as XSS, also it encode & decode the string,ASCII conversion.This
extension will help you in exploiting sql injections, XSS holes. If you know what you’re doing, this
extension will help you do it faster. If you want to learn SQL exploitation, you can also use this
extension, but you will probably also need a book, a lot of Google and a brain :)
Download: https://addons.mozilla.org/en-US/firefox/addon/hackbar/
FREEBIES
 http://www.autodesk.com/education/free-software/all
 https://aws.amazon.com/grants/
 https://education.github.com/pack
LINKS TO CASE
STUDIES Facebook PageTakeover Bug:
http://arunsureshkumar.me/index.php/2016/09/16/facebook-page-takeover-zero-
day-vulnerability/
 Ola Free Rides Bug:
https://blog.appknox.com/major-bug-in-ola-app-can-make-you-either-rich-or-
poor/
CONTACT
Avi Sharma – 7830993535 – sharma.avi14@stu.upes.ac.in
THANK YOU

Mais conteúdo relacionado

Mais procurados

Publicidad de los programas (1)
Publicidad de los programas (1)Publicidad de los programas (1)
Publicidad de los programas (1)GABO
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
iOS Automation Frameworks evaluation
iOS Automation Frameworks evaluationiOS Automation Frameworks evaluation
iOS Automation Frameworks evaluationSerghei Moret
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityShubhneet Goel
 
POC-Netsparker
POC-NetsparkerPOC-Netsparker
POC-NetsparkerRaj Sawant
 
Top 10 Web Vulnerability Scanners
Top 10 Web Vulnerability ScannersTop 10 Web Vulnerability Scanners
Top 10 Web Vulnerability Scannerswensheng wei
 
Testing Native Apps at PAYBACK
Testing Native Apps at PAYBACKTesting Native Apps at PAYBACK
Testing Native Apps at PAYBACKMarcel Gehlen
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedNoNameCon
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development Cheng-Yi Yu
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android AapplicationsRoshan Thomas
 
Mobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App SecurityMobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App SecurityDevOps.com
 
Mobile Application Test check list
Mobile Application  Test check list Mobile Application  Test check list
Mobile Application Test check list Tanmoy Ray
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for androidJPINFOTECH JAYAPRAKASH
 
Testing Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionTesting Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionJose Manuel Ortega Candel
 

Mais procurados (20)

Publicidad de los programas (1)
Publicidad de los programas (1)Publicidad de los programas (1)
Publicidad de los programas (1)
 
Bugzilla
BugzillaBugzilla
Bugzilla
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
iOS Automation Frameworks evaluation
iOS Automation Frameworks evaluationiOS Automation Frameworks evaluation
iOS Automation Frameworks evaluation
 
Andriod Pentesting and Malware Analysis
Andriod Pentesting and Malware AnalysisAndriod Pentesting and Malware Analysis
Andriod Pentesting and Malware Analysis
 
Vm Penetration Test
Vm Penetration TestVm Penetration Test
Vm Penetration Test
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
POC-Netsparker
POC-NetsparkerPOC-Netsparker
POC-Netsparker
 
What the fuzz
What the fuzzWhat the fuzz
What the fuzz
 
Top 10 Web Vulnerability Scanners
Top 10 Web Vulnerability ScannersTop 10 Web Vulnerability Scanners
Top 10 Web Vulnerability Scanners
 
Testing Native Apps at PAYBACK
Testing Native Apps at PAYBACKTesting Native Apps at PAYBACK
Testing Native Apps at PAYBACK
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Bugzilla
BugzillaBugzilla
Bugzilla
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android Aapplications
 
Mobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App SecurityMobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App Security
 
Mobile Application Test check list
Mobile Application  Test check list Mobile Application  Test check list
Mobile Application Test check list
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
 
Testing Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionTesting Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam edition
 

Destaque

Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Ms. Amrita Burman
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Ms. Amrita BurmanMentor Conclave 2015 - Mentor Talks 5 Best Practices - Ms. Amrita Burman
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Ms. Amrita BurmanLXL Ideas
 
Самопрезентація учителя української мови та літератури Полятикіної Л.П.
Самопрезентація учителя української мови та літератури Полятикіної Л.П.Самопрезентація учителя української мови та літератури Полятикіної Л.П.
Самопрезентація учителя української мови та літератури Полятикіної Л.П.polyatikinalyubov
 
Mentor Conclave 2015 - Impact - Mr. Dilip Patel - Zentangles as an Education ...
Mentor Conclave 2015 - Impact - Mr. Dilip Patel - Zentangles as an Education ...Mentor Conclave 2015 - Impact - Mr. Dilip Patel - Zentangles as an Education ...
Mentor Conclave 2015 - Impact - Mr. Dilip Patel - Zentangles as an Education ...LXL Ideas
 
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Mr. Vinaayaka Kalletla
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Mr. Vinaayaka KalletlaMentor Conclave 2015 - Mentor Talks 5 Best Practices - Mr. Vinaayaka Kalletla
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Mr. Vinaayaka KalletlaLXL Ideas
 
Engineered Custom Dry Handling Systems
Engineered Custom Dry Handling SystemsEngineered Custom Dry Handling Systems
Engineered Custom Dry Handling SystemsSerge Crainic
 
See You At the Top(SYAT)
See You At the Top(SYAT)See You At the Top(SYAT)
See You At the Top(SYAT)Mohit Bhat
 
Mentor Conclave 2015 - Impact - Ms. Gitanjali Sarangan - Arts Based Therapy i...
Mentor Conclave 2015 - Impact - Ms. Gitanjali Sarangan - Arts Based Therapy i...Mentor Conclave 2015 - Impact - Ms. Gitanjali Sarangan - Arts Based Therapy i...
Mentor Conclave 2015 - Impact - Ms. Gitanjali Sarangan - Arts Based Therapy i...LXL Ideas
 
Mentor Conclave 2015 - Impact - Ms. Poonam Bir Kasturi - Waste Management in ...
Mentor Conclave 2015 - Impact - Ms. Poonam Bir Kasturi - Waste Management in ...Mentor Conclave 2015 - Impact - Ms. Poonam Bir Kasturi - Waste Management in ...
Mentor Conclave 2015 - Impact - Ms. Poonam Bir Kasturi - Waste Management in ...LXL Ideas
 
Досвід роботи Полятикіної Л. П.
Досвід роботи Полятикіної Л. П.Досвід роботи Полятикіної Л. П.
Досвід роботи Полятикіної Л. П.polyatikinalyubov
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropboxDown2ride
 

Destaque (20)

IHSCorporateBrochure
IHSCorporateBrochureIHSCorporateBrochure
IHSCorporateBrochure
 
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Ms. Amrita Burman
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Ms. Amrita BurmanMentor Conclave 2015 - Mentor Talks 5 Best Practices - Ms. Amrita Burman
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Ms. Amrita Burman
 
Thermometer calibration guidelines complete bocklet 2
Thermometer calibration guidelines complete bocklet 2Thermometer calibration guidelines complete bocklet 2
Thermometer calibration guidelines complete bocklet 2
 
Самопрезентація учителя української мови та літератури Полятикіної Л.П.
Самопрезентація учителя української мови та літератури Полятикіної Л.П.Самопрезентація учителя української мови та літератури Полятикіної Л.П.
Самопрезентація учителя української мови та літератури Полятикіної Л.П.
 
Mentor Conclave 2015 - Impact - Mr. Dilip Patel - Zentangles as an Education ...
Mentor Conclave 2015 - Impact - Mr. Dilip Patel - Zentangles as an Education ...Mentor Conclave 2015 - Impact - Mr. Dilip Patel - Zentangles as an Education ...
Mentor Conclave 2015 - Impact - Mr. Dilip Patel - Zentangles as an Education ...
 
Ada 1-sem equipo3
Ada 1-sem equipo3Ada 1-sem equipo3
Ada 1-sem equipo3
 
Gestion sostenible
Gestion sostenibleGestion sostenible
Gestion sostenible
 
Modul sains f1 isma 2016
Modul sains f1 isma 2016Modul sains f1 isma 2016
Modul sains f1 isma 2016
 
pinturas plasticas
pinturas plasticaspinturas plasticas
pinturas plasticas
 
Intb3 equipo3
Intb3 equipo3Intb3 equipo3
Intb3 equipo3
 
Pbs sc t1_jawapan
Pbs sc t1_jawapanPbs sc t1_jawapan
Pbs sc t1_jawapan
 
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Mr. Vinaayaka Kalletla
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Mr. Vinaayaka KalletlaMentor Conclave 2015 - Mentor Talks 5 Best Practices - Mr. Vinaayaka Kalletla
Mentor Conclave 2015 - Mentor Talks 5 Best Practices - Mr. Vinaayaka Kalletla
 
Intb3 ggpsv
Intb3 ggpsvIntb3 ggpsv
Intb3 ggpsv
 
Engineered Custom Dry Handling Systems
Engineered Custom Dry Handling SystemsEngineered Custom Dry Handling Systems
Engineered Custom Dry Handling Systems
 
See You At the Top(SYAT)
See You At the Top(SYAT)See You At the Top(SYAT)
See You At the Top(SYAT)
 
Mentor Conclave 2015 - Impact - Ms. Gitanjali Sarangan - Arts Based Therapy i...
Mentor Conclave 2015 - Impact - Ms. Gitanjali Sarangan - Arts Based Therapy i...Mentor Conclave 2015 - Impact - Ms. Gitanjali Sarangan - Arts Based Therapy i...
Mentor Conclave 2015 - Impact - Ms. Gitanjali Sarangan - Arts Based Therapy i...
 
Cambodia
CambodiaCambodia
Cambodia
 
Mentor Conclave 2015 - Impact - Ms. Poonam Bir Kasturi - Waste Management in ...
Mentor Conclave 2015 - Impact - Ms. Poonam Bir Kasturi - Waste Management in ...Mentor Conclave 2015 - Impact - Ms. Poonam Bir Kasturi - Waste Management in ...
Mentor Conclave 2015 - Impact - Ms. Poonam Bir Kasturi - Waste Management in ...
 
Досвід роботи Полятикіної Л. П.
Досвід роботи Полятикіної Л. П.Досвід роботи Полятикіної Л. П.
Досвід роботи Полятикіної Л. П.
 
Get started with dropbox
Get started with dropboxGet started with dropbox
Get started with dropbox
 

Semelhante a Squashing bugs: Introduction to Bug Bounties ISSA Dehradun Chapter

Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Shubham Gupta
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsEran Goldstein
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingMuhammad Khizer Javed
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantagesRocket11986
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guideSudhanshu Chauhan
 
Android mobile app security offensive security workshop
Android mobile app security   offensive security workshopAndroid mobile app security   offensive security workshop
Android mobile app security offensive security workshopAbhinav Sejpal
 
100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your Testing100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your TestingBugRaptors
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023SofiaCarter4
 
Top 10 static code analysis tool
Top 10 static code analysis toolTop 10 static code analysis tool
Top 10 static code analysis toolscmGalaxy Inc
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideAryan G
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
Let's pwn a chinese web browser!
Let's pwn a chinese web browser!Let's pwn a chinese web browser!
Let's pwn a chinese web browser!Juho Nurminen
 

Semelhante a Squashing bugs: Introduction to Bug Bounties ISSA Dehradun Chapter (20)

Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentals
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty Hunting
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
Android mobile app security offensive security workshop
Android mobile app security   offensive security workshopAndroid mobile app security   offensive security workshop
Android mobile app security offensive security workshop
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Burp intruder
Burp intruderBurp intruder
Burp intruder
 
100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your Testing100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your Testing
 
App locker
App lockerApp locker
App locker
 
Installing iPython.docx
Installing iPython.docxInstalling iPython.docx
Installing iPython.docx
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Bug Bounty
Bug BountyBug Bounty
Bug Bounty
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Top 10 static code analysis tool
Top 10 static code analysis toolTop 10 static code analysis tool
Top 10 static code analysis tool
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Let's pwn a chinese web browser!
Let's pwn a chinese web browser!Let's pwn a chinese web browser!
Let's pwn a chinese web browser!
 

Último

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Squashing bugs: Introduction to Bug Bounties ISSA Dehradun Chapter

  • 2. SESSION OUTLINE  Introduction to Bug Bounties 2:05-2:15  How to find bugs hands-on 2:15-2:35  How to use popular bug bounty programs 2:35-2.45  Case evaluation: Facebook page takeover bug 2:45-2:255  Conclusions and surprises 2:55 onwards
  • 4. BUG BOUNTY  A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities.  These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse.  Bug bounty programs have been implemented by Facebook,Yahoo!, Google, Reddit, Square and Microsoft.
  • 5. REWARDS  Hall of fame(s)  $$$  Study grants and scholarships for research  Recognition
  • 6. FAQS & MISCONCEPTIONS I do not have any of those fancy security research tools  I do not have excellent coding knowledge  How do I begin and where do I begin?
  • 7. WHAT YOU NEED  Be able to read and understand code  Keep an open eye for different attack possibilities  Keep updated with the latest attacks and see their POCs (Proof of Concept)  Differentiate between bugs and false positives (https://www.facebook.com/notes/facebook-bug-bounty/commonly- submitted-false-positives/744066222274273 )  Don’t give up!
  • 8. FLOW  Know about bugs! Refer OWASPTop 10  https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project  Use a testing guide!  OWASPTesting Project (https://www.owasp.org/images/1/19/OTGv4.pdf )  Follow researchers and their updates!
  • 9. FAMOUS RESEARCHERS http://www.breaksec.com/?page_id=6002  http://homakov.blogspot.in/  https://bitquark.co.uk/blog/  https://nealpoole.com/blog/  http://nahamsec.com/  http://stephensclafani.com/  http://insertco.in/articles  arunsureshkumar.me
  • 10. PRACTICE AT  http://www.dvwa.co.uk/  https://www.vulnhub.com/  https://github.com/WebGoat/WebGoat
  • 11. HANDS ON Search “Google dorks” to find vulnerable websites. Sample strings: Inurl:admin_login.php site:.pk SQL Injection string to be entered in username and password fields: ' or 1=1--
  • 12. BURP SUITE  Burp Suite: Burp Suite is an integrated platform for performing security testing of applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. Burp gives you full control, letting you combine advanced manual techniques with state-of-the- art automation, to make your work faster, more effective, and more fun.  (It is one of the most awesome tools i have ever come across. there are a lot of features you can use, just make sure you understand each and every function from burp suite). I’m sure you know all the functionality will make your task way easier if it is related to security. But be sure to manually validate your findings as it does report false positives. Download: http://portswigger.net/burp/download.html
  • 22. SOME TERMS USED IN CLASS  IDOR: Insecure Direct Object Reference https://www.owasp.org/index.php/Top_10_2013-A4- Insecure_Direct_Object_References  Rate Limiting: http://www.websecresearch.com/2014/05/a-way-to-bypass-rate-limiting.html
  • 23. RESOURCES TO SCAN WEBSITES  https://hackertarget.com/joomla-security-scan/  https://hackertarget.com/wordpress-security-scan/  https://hackertarget.com/drupal-security-scan/  https://pentest-tools.com/website-vulnerability-scanning/discover-hidden-directories-and-files  https://www.magereport.com/  https://pentest-tools.com/information-gathering/find-subdomains-of-domain  http://savanttools.com/test-frame  https://bugcrowd.com/resources  https://www.ssllabs.com/ssltest/  http://www.kitterman.com/spf/validate.html  https://forum.bugcrowd.com/t/researcher-resources-tools/167  https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102
  • 24. RESOURCES  Tamper Data:Tamper Data is a Firefox Extension which gives you the power to view, record and even modify outgoing HTTP requests. If you are not familiar with then just take a look at it once, It is very helpful in identifying the CSRF issues as well as Finding IDOR. Download: https://addons.mozilla.org/en-US/firefox/addon/tamper-data/  Live http Headers:To be very frank I rarely use this extension, as it has exactly the same function as in tamper data the only difference is that, you can capture and reply within the same session. Download: https://addons.mozilla.org/en-US/firefox/addon/live-http-headers/  Default user agent switcher: It gives your ability to change your user agent. Basically i use it to find mobile version of any site.And you may utilize it whenever you want to see the mobile version of any website. mostly developers host mobile version on m.xyzdomain.com, but sometimes website load mobile version after detecting the user agent.With this extension you can change user agent as mobile and view mobile version of the sites. Download: https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/  Hackbar: It helps us In SQL as well as XSS, also it encode & decode the string,ASCII conversion.This extension will help you in exploiting sql injections, XSS holes. If you know what you’re doing, this extension will help you do it faster. If you want to learn SQL exploitation, you can also use this extension, but you will probably also need a book, a lot of Google and a brain :) Download: https://addons.mozilla.org/en-US/firefox/addon/hackbar/
  • 26. LINKS TO CASE STUDIES Facebook PageTakeover Bug: http://arunsureshkumar.me/index.php/2016/09/16/facebook-page-takeover-zero- day-vulnerability/  Ola Free Rides Bug: https://blog.appknox.com/major-bug-in-ola-app-can-make-you-either-rich-or- poor/
  • 27. CONTACT Avi Sharma – 7830993535 – sharma.avi14@stu.upes.ac.in