This document provides an overview of bug bounty hunting. It discusses:
- What bug bounty programs are and how they work
- A brief history of major bug bounty programs from the 1990s to present day
- Reasons to participate in bug bounty hunting like money, career opportunities, and enjoyment
- Popular bug bounty platforms and programs
- How to get started with the process of bug hunting
- Tips for writing bug reports that document the issue and steps to reproduce it
- Examples of past bug bounty finds, like an SVG XSS filter bypass and a tapjacking proof of concept
3. Shubham Gupta (@hackerspider1)
Just another random lazy guy interested in security
Security Consultant at Pyramid Cyber Security & Forensic
Bug Bounty Hunter
{Just do when I need money
BCA Graduate
{Doesnt Matter
Penetration tester
7. Introduction
History
Why bug hunting?
How to do bug hunting?
Quick Tips
POC
Pros and Cons of bug hunting.
Q&A
Agenda
8. What is #Bug Bounty
Also calls as VRP (Vulnerability Reward Program)
Company (Security Team/Vendor)
Create Program.
Offer Cash , HOF , Swag.
Acknowledge Your Work.
Researchers / Bug Hunter
Hit Target and Get Bugs.
Sometimes Duplicates , Sometime $$$ , Sometime Swag.
Recheck Bug After Fix.
10. Why bug hunting?
Chances of finding bugs to put on
your cv.
Possibility of getting job.
lots of money in very less time
Cool T-shirts, Hoodies, Mugs and
many more swags
Recognition
Connections
Less security breaches
Enjoyment
Person will Learn to work hard
because of Competition
11. Bug Bounty Programs And Platforms
Popular Programs
- Google (Min 100$ & Max 20000$)
- Yahoo (Min 50$ & Max 15000$)
- Facebook Min 500$
- Want to know More
Github
Twitter
Microsoft
13. Popular Platform
BugCrowd
Managed Security Program for Company
27125 World Wide Researcher
200+ Programs
HackerOne
Security Inbox for Company
133+ Public Program
6.91M Paid
Synack
Everyone Want To Join
Cobalt
15. How to do bug hunting?
Bug hunting is all about Exploring Weaknesses and
Experimentation.
It requires 30% programming knowledge and 70% logical out
of box thinking.
Try each and every Combination to exploit bug .
Dig dipper.
Try more to find logical bugs it will increase your chance for
higher payouts and reduce chances for Duplicates.
22. SVG XSS
One of the most unique bug of 2015 and easy to find.
Most of the web based projects include svg for a clear and interactive user
experience.
To verify this answer I created an svg file with an XSS vector below and started
testing the websites that allow images .
#2: Before I start giving my presentation I just want to know how many of you are familiar with bug bo
unty
#3: So ladies and gentleman Im going to present the bug bounty play for money
#5: Im lucky enough to find vuln. In google, yahoo, twitter actually there are so many company I dont remember all of the name u can find all of them.
#9: Lets start with what is bug bounty? Bug bounty is also called as VRP
vuln. Reward program bassically there are two section in bug bounty
Company and researcher in professional we
#23: the page will render the content of the xml as html , so resulting on a xss vulnerability.
#26: UI Redressing (Tap jacking) attack may trick users into tapping a specifically crafted malicious App popup window (e.g. toast view), making it a gateway for varied threats such as framing attack. Using this technique, a malicious App could potentially trick a user into making purchases, clicking on ads, installing Apps, or even wiping all of the data from the phone.