BUG BOUNTY WORKSHOP
FUNSHOP
AGENDA
Intro
#whoami
Hey you! What’s Bug Bounty?
What’s Bug Bounty?
How to select a target?
How to select a target?
Assets in scope:
Paying attention to out of scope / exclusions list:
Meh “really? Do you even care about Security 🤔”
Diving deep into the target, Passive..sh Recon
Diving deep into the target using passive..sh Recon
Find all the **ASSETS** that belongs to that organisation. Assets?
Subdomains | Asset(s) Identification
CSP Headers
gist.github.com
gist.github.com
Cost of Human Errors :(
Trello, Jira, Gitlab ...
Even though if an organization's Jira instance has an auth, administrators set up "public" projects, they forget “public” means public for everyone. This could sometime give you keys to kingdom.
Trello, Jira, Gitlab ...
Thanks Ed :)
fofa.so - chinese version of shodan
shodan.io
IP Ranges
IP Ranges
IP Ranges
Sir, I’ve found the IP Space now what?
IP Range - now what?
Oh the mobile apps are in scope, what should I look for?
Did you know? You can find leakage of sensitive data in mobile apps without even installing them on your phone. Howwww?
Oh the mobile apps are in scope, what should I look for?
Short Cut:
Oh the mobile apps are in scope, what should I look for?
Long Route:
Oh the mobile apps are in scope, what should I look for?
VIRUSTOTAL
Hacking with BurpSuite
Setting the right Scope
Hacking with BurpSuite
Hacking with BurpSuite
Keeping an eye on these issues list, always handy and helps a lot!
Hacking with BurpSuite
BURP SPIDER
Will cover up in Live Session
Hacking with BurpSuite
Did you know? You don’t always need an automated Script to demonstrate the impact of any data leak [PIIs].
Intruder for the win!
Hacking with BurpSuite
Using “Repeater tab” to find:
Hacking with BurpSuite
Hacking with BurpSuite
SQLi(s)�id=1’
id=1‘’
id=1’-sleep(10)-’
id=1"
id=1"“
id=1"-sleep(10)-”
id=1/sleep(10)
Hacking with BurpSuite
Hacking with BurpSuite
Easy Privilege Escalation with Repeater
Hacking with BurpSuite
JS for the WIN
Feeding these in tool
python linkfinder.py -i /Desktop/z.burp -b -o cli
Shooting in Dark? Understand the application flow to find bugs
Shooting in Dark? Understand the application flow to find more bugs
You’re doing it wrong -
What happens next if you haven’t done your homework?
Shooting in Dark? Understand the application flow to find more bugs
What happens next if you haven’t done your homework?
Shooting in Dark? Understand the application flow to find more bugs
Researchers have a tendency to jump on the target application and start attacking them. What happens then?
YOU END UP GETTING DUPE
Shooting in Dark? Understand the application flow to find more bugs
Shooting in Dark? Understand the application flow to find more bugs
If you’ve invested good amount of time on a target, you will:
Found an internal endpoint in JS and immediately knew what parameters to use based on my past research
Shooting in Dark? Understand the application flow to find more bugs
Shooting in Dark? Understand the application flow to find more bugs
Read the Docs = Get a BUG?
Shooting in Dark? Understand the application flow to find more bugs
Few Nice Reads:
Better Bug Bounty Report
better bug reports
Better Bug Bounty Report
better bug reports
better relationship
Better Bug Bounty Report
better bug reports
better relationship
better bounties
Sharing from other side of the fence
What you shouldn’t do?
Sharing from other side of the fence
Sharing from other side of the fence
The Wrong Way,
How not to submit a report?
Sharing from other side of the fence
The Right Way -
Sharing from other side of the fence
Before reporting, always think from organization’s point of view and think from the other side -
Understand companies nature of business
Seeing an image of other users on a company like Zomato? Seriously are you kidding me? That’s not sensitive at all - Closing it as N/A
VS
Viewing others uploaded images on an Image Sharing Site
Sharing from other side of the fence
Mantra to build a strong relationship with Security team
Keeping up with new trends
….Staying on top of new hacking trends can help you earn more bounties.
Keeping up with new trends
Sir, what should we do to keep up with all the new trends?
#BugBounty #BugBountyTip #TogetherWeHitHarder
Subscribe to topics like Information Security, Bug Bounty, Infosec, etc..
Keeping up with new trends
IT’S ALL ABOUT SOURCES
Keeping up with new trends
Hacktivity! https://hackerone.com/hacktivity
ZERO DAILY! https://hackerone.com/zerodaily
Profit!! Time to earn bounties...
Profit!! Time to earn bounties...
Profit!! Time to earn bounties...
LIVE BURP SUITE SESSION
#bugbountytip
#bugbountytip
#bugbountytip
#bugbountytip
Waybackurls
Scrape URLs using - https://github.com/tomnomnom/waybackurls/
root@pt:~/tools/recon/waybackurl$ cat domains.txt | waybackurls > urls
root@pt:~/tools/recon/waybackurl$ cat urls | grep ".js"
#bugbountytip
Bringing few more #tips:
#bugbountytip
Sir, please one more! Okay, take this ezzy money!
Recap | Let’s Roll It Back
Thank You