Download - Bug Bounty #Defconlucknow2016

Transcript
Page 1: Bug Bounty #Defconlucknow2016

Bug Bounty

Shubham Gupta & Yash Pandya

Page 2: Bug Bounty #Defconlucknow2016

About Us

Page 3: Bug Bounty #Defconlucknow2016

Shubham Gupta

Just another random guy interested in security

Web Application Hacker

Security Consultant at Pyramid Cyber Security & Forensic

I’ve been got acknowledgement by more than 100 companies like as Google, Microsoft, Twitter, Yahoo, Adobe. Among top 100 bug hunter in Hackerone.

Penetration tester

Page 4: Bug Bounty #Defconlucknow2016

Yash Pandya

23 yr old Electronics and communication engineer from Gujarat .

i have experience in R&D on Embedded systems , networking, image processing, Robotics ,RTOS and Web application security.

Working as a Senior Security tester at IGATE GLOBAL Solutions.

I’ve been got acknowledgement by more than 100 companies like as Google, Microsoft, Yahoo, Apple, AT&T.

My primary goal is to give contribution towards open source technologies and make cyber space more secure and safer.

Page 5: Bug Bounty #Defconlucknow2016

Agenda

Introduction Why bug hunting?How to do bug hunting?Quick TipsPOCPros and Cons of bug hunting.Q&A

Page 6: Bug Bounty #Defconlucknow2016

INTRODUCTION

Page 7: Bug Bounty #Defconlucknow2016

A Brief History of Bug Bounty Programs.

- 1995 (Net Scape) - 2004 (FIREFOX)

- 2005 - 2007

- 2010- 2011

- 2012 - 2013

-2013(Cobalt)

- 2013 (Synack)

Page 8: Bug Bounty #Defconlucknow2016

Now even a College dropout or even school boy can do that seating at home so BIG THANKS TO BUGBOUNTY PROGRAMME!!! :D

In 2015 few researchers set a great example for community by earning 5,00,000$/year without doing any job.

BYE BYE !!!!

2015 was really challenging year for BUGBOUNTY Hunters.Because “><img src=x onerror=prompt(1)> was not gonna work :P .

Page 9: Bug Bounty #Defconlucknow2016

In 2015 bug hunters Proved that

Bug hunters going to do anything to earn more money in 2015 because of that they started thinking out of the box scenarios.

Some of the creative and impressive bugs reported in 2015 are as below:

I. Svg File upload xss.II. CSV InjectionsIII. EL Injections.IV. Sub domain takeoverV. Same Origin bypass

Page 10: Bug Bounty #Defconlucknow2016

Bug bounty hunters dream hall of fame companies

Page 11: Bug Bounty #Defconlucknow2016

Why to invest time in hunting bugs rather then development?

Page 12: Bug Bounty #Defconlucknow2016

Why bug hunting?

Chances of finding bugs to put on your cv.

Possibility of getting job.

lots of money in very less time

Cool T-shirts, Hoodies, Mugs and many more swags

Recognition

Connections

Less security breaches

Enjoyment

Person will Learn to work hard because of Competition

Page 13: Bug Bounty #Defconlucknow2016

Types of bugs.

Web Vulnerabilities.

Software Products Vulnerabilities

Browser Vulnerabilities

Network Vulnerabilities

Mobile app Vulnerabilities.

Hardware Vulnerabilities.

Page 14: Bug Bounty #Defconlucknow2016

How to kickoff for hunting bugs?

Page 15: Bug Bounty #Defconlucknow2016

How to do bug hunting?

Bug hunting is all about Exploring Weaknesses and Experimentation.

It requires 30% programming knowledge and 70% logical out of box thinking.

Try each and every Combination to exploit bug . Dig dipper. Try more to find logical bugs it will increase your chance for higher payouts and reduce chances for Duplicates.

Page 16: Bug Bounty #Defconlucknow2016

OWASP Testing Guide / Web Application Hackers handbook. Public reports and papers from .

https://packetstormsecurity.com/http://h1.nobbd.de/

https://www.facebook.com/notes/phwd/facebook-bug-bounties/707217202701640

Tools Burp/ZAP/Fiddeler. Ironowasp. Appwatch Appie

Page 17: Bug Bounty #Defconlucknow2016

QUICK TIPS

Page 18: Bug Bounty #Defconlucknow2016

Quick Tips Don’t use scanner.

Use Google Dorks. I. EX: inurl: src|path|link|url II. filetype:asp|aspx|jsp|jspa|php

Make your own.

Create Google alerts for recent changes in Bug bounty programmes or for any other security related blogs.

Page 19: Bug Bounty #Defconlucknow2016

Look out for information disclosure which are quick to find:I. https://www.site.com/.htaccess if you are lucky then you will get

access of .htaccess. Now go and report this bug and earn some $$ . II. Go to https://www.site.com/server-statusIII. GO to https://www.site.com/.svn/entries

. Try for Directory traversal using python script and using it try to find RCE .

IDOR by changing id parameters in request .

Unauthorized access of Data. Ex: Try to access pics or conversations or files which is deleted using api.

Page 20: Bug Bounty #Defconlucknow2016

Try to Complete CTF, online hacking Challenges.

Attend Webinars, Security Conferences.

Make Good relations with other security researchers and try to learn something from them.

Try to report Exploitable bugs .Don’t waste your and other’s time by reporting Non-Exploitable issues.

Try to test each platform IOS, ANDROID, SOFTWARE , Web Applications.

Read as much as you can.

Page 21: Bug Bounty #Defconlucknow2016

POC

Page 22: Bug Bounty #Defconlucknow2016

Svg XSS

One of the most unique bug of 2015 and easy to find.

Most of the web based projects include svg for a clear and interactive user experience.

Page 23: Bug Bounty #Defconlucknow2016

To verify this answer I created an svg file with an XSS vector below and started testing the websites that allow images .

Page 24: Bug Bounty #Defconlucknow2016
Page 25: Bug Bounty #Defconlucknow2016

Most of the site is vulnerable for svg xss.

Page 26: Bug Bounty #Defconlucknow2016

I was like

Page 27: Bug Bounty #Defconlucknow2016

5 IDOR in GOOGLE’S ACQUISITION

Title: IDOR : DELTE any user's Pagerduty services from stack driver. URL: https://app.stackdriver.com/settings/notifications/pagerduty/

Steps to reproduce:

1. go to https://app.stackdriver.com/settings/notifications/pagerduty/2. Add service3. click on delete service4. capture the request using burp suite5. From Captured request change notification_method_id=any value6. Remove x-CsrfToken value from request.7. submit the request

you can successfully delete pagerduty service of any user.

Page 28: Bug Bounty #Defconlucknow2016

Request: GET /api/settings/policies-by-notification-method?notification_method_id=821&amp;notification_method_type=pagerduty HTTP/1.1Host: app.stackdriver.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflate X-CSRFToken: sNLQRp560GcTsDf228EWmzhoAfRt3XMg Referer: https://app.stackdriver.com/settings/notifications/pagerduty/ Cookie: __utma=25593471.1715845722.1411286450.1444643859.1445864251.5; csrftoken=sNLQRp560GcTsDf228EWmzhoAfRt3XMg;

Page 29: Bug Bounty #Defconlucknow2016

Some time you can be lucky

Page 30: Bug Bounty #Defconlucknow2016

Subdomain Takeover in Avant

Parth thanks for writing that code

Page 31: Bug Bounty #Defconlucknow2016
Page 32: Bug Bounty #Defconlucknow2016

Insecure Internal Storage

Page 33: Bug Bounty #Defconlucknow2016

DO’S AND DON’TS

Page 34: Bug Bounty #Defconlucknow2016

Do’s and Don’ts

When don’t “pay” don’t invest much time. Don’t be a script kiddie always dig dipper. Play by your own rules Learn about the most common eligible vulnerabilities, how to find

them, and how to increase your chances of receiving rewards. Become an effective hunter and start reporting bugs for cash in no

time.

Page 35: Bug Bounty #Defconlucknow2016

Thanks

Page 36: Bug Bounty #Defconlucknow2016

What to do with bug bounties?

Page 37: Bug Bounty #Defconlucknow2016

Spend like a billionaire

Page 38: Bug Bounty #Defconlucknow2016

Do the donation this is How you become a true billionaire

Page 39: Bug Bounty #Defconlucknow2016
Page 40: Bug Bounty #Defconlucknow2016