Atmosphere Bug Bounty Guide 2 How to Report Good Examples Improving your Report Ground Rules 3 Why do we need What are the rules Experience Sharing 4 Black hat hackers White hat hackers Share your knowledge
2017 $76,500 USD in Bounties 2015 Limited-time Launch 2019 Sep Over $60,000 USD in Bounties 2018 $104,500 USD in Bounties 2016 Full-time Launch 2019 Dec New record? Timeline
Our duty/goal as security team ◦ To keep our customers safe GOAL: Protect users Make services/products safe Application security Infra protection Bug bounty program
If there is no RULES? ◦ No boundaries between bug hunting and real-world hacking GOAL: Protect users Make services/products unsafe Bug bounty program with NO RULES!
With the rules, ◦ Can decide whether Bug Bounty action or real-world hacking • So, we made the ground rules ◦ publicize them: https://github.com/line/bugbounty Security Hacking Bug Bounty Rules!
our scopes ◦ LINE applications, web servers ◦ NOT social engineering, internal servers • Check on eligibility section in https://bugbounty.linecorp.com/en/
Abusing bugs to gain confidential data ◦ Especially, mid(Member ID in LINE) ◦ According to the law, MID is categorized as “Personal Information” LINE servers Bug hunter Abuser 10 mids of your friends at LINE 10,000 mids of not your friends at LINE
• Life as a black hat hacker (heard from friends) ◦ To avoid getting caught, prepare all the time ◦ Keep untrackable from police and security team • Benefit? ◦ Low returns per laber ◦ Keep running away from the society
• Life as a white hat hackers ◦ More opportunities, more returns ◦ Can get reputation, money, and fun life ◦ Absolutely better than black hat hackers ✓ In long term life as a security engineer