Upgrade to Pro — share decks privately, control downloads, hide ads and more …

The #bugbounty comic

g4mm4
January 06, 2015

The #bugbounty comic

My funny talk @tetcon2015

g4mm4

January 06, 2015
Tweet

Other Decks in Technology

Transcript

  1. #/usr/bin/whoami (a bit of self promotion :) • OWASP Viet

    Nam Leader • CTF Player/Organizer • Bounty Hunter (in spare time) • The professional billiards/ pingpong/ badminton player
  2. What is Bug Bounty? Vendor : • Create a program

    • Offer HOF (or) Swag (or) Reward (or) Duplicate • Get the all vulnerabilities and Fix asap ! • Make products and applications secure Researcher : • Find the vulnerabilities in target • Get mostly duplicates :P • Other wise Hof, Swag (or) Reward ! • Share in Social Network
  3. Why bug bounties? • Hacking without going to JAIL •

    Chances of finding bugs to put on your resume • Possibility of getting a job in the industry • Opportunity to make money while attending college • Working with researchers/hackers from all over the world
  4. The #bugbounty core rules • First-come, first-served, be quick if

    you don't want to be an underdog. • Do not use any automated scanners/ It's lame (It's ok if you use your own tools. Don't tell me you're the Author of Acunetix scanner =]], pretty lame). • Do not make any information public until the issue has been resolved. • Do not report of missed protection mechanism / inconsistent with best practices (e.g. no CSRF token, framing/clickjacking protection) without demonstration of real security impact for user or system.
  5. The #bugbounty core rules (cont) • Don’t make any threats.

    • Don’t ask for money or “swag” if it’s not mentioned in the rules. • Don’t compare two programs. Two programs = different budgets. • Don’t audit without permission. Legal issues • Respect the program’s decisions. • Respect other researchers. • Quality vs Quantity. Reputation in the industry.
  6. Sql Injection in http://hk.promotion.yahoo.net (out of scope). Yahoo! Rewarded $1.000

    Meanwhile Sql Injection in http://br.educacao.yahoo.net (out of scope), Yahoo decided this report is not eligible for a bounty. It's OK, It's Yahoo's logic.
  7. References • Decoding Bug Bounty Programs https://www.owasp.org/images/1/14/Rose.pdf http://bluemoon.com.vn/advisories/bmsa200905.html http://bluemoon.com.vn/advisories/bmsa201102.html •

    Bugbounty 101 http://nahamsec.com/Presentations/NBTCon-December-2014-Slides.pdf • Fun & profit with bug bounties http://www.slideshare.net/null0x00/fun-profit-with-bug-bounties • Tìm Lỗ Lấy Tiền http://vnhacker.blogspot.com/2011/11/tim-lo-lay-tien.html