SlideShare a Scribd company logo
1 of 24
Download to read offline
GETTING BEYOND BUG
BOUNTY NOOB STATUS
@yaworsk
www.leanpub.com/web-hacking-101
www.youtube.com/yaworsk1
OVERVIEW
▪Who am I and why do you care?
▪What are bug bounties?
▪Lessons learned (with examples)
▪Getting started
WHO AM I?
▪ @yaworsk on HackerOne, Twitter, etc.
▪ 11 – months since I started bug bounties
▪ 24 – number of thanks received on HackerOne
▪ 105 – bugs found on HackerOne
▪ 67 – Rank on HackerOne (as of Nov 3, 2016)
▪ 0 – total security experience in November 2015
▪ Formal education in Public Policy
▪ Self taught “developer”
▪ Web Hacking 101 Book / Hacking Pro Tips
WHAT ARE BUG BOUNTIES
Source: Bugcrowd
WHAT ARE BUG BOUNTIES (CONT’D)
▪ HackerOne (as of Nov 2, 2016)
▪ 32,470 bugs fixed
▪ 3,970 hackers thanked
▪ 155 public programs
▪ ~600+ total programs
▪ Hacktheplanet + Hacktivity
▪ Bugcrowd (as of Mar 31, 2016)
▪ 6,803 paid submissions
▪ 26,782 “researchers”
▪ ~100 public programs
(62 shown online as of Nov 2, 2016)
▪ ~180 private programs
▪ Monthly / yearly bonuses + Forum
WHAT ARE BUG BOUNTIES (CONT’D)
HackerOne Bugcrowd
LESSONS LEARNED
Hacking is not easy money
POC || GTFO
Your reputation is gold
Skill, observation & relationships
Pay it forward
1. HACKING IS NOT EASY MONEY
▪ @ITSecurityGuard
▪ thanks from Uber, Google, Yahoo, Snapchat, Apple CVE
▪ first 7 bugs on Paypal, all dupes and unrewarded
▪ @filedescriptor
▪ over $200k from Twitter alone
▪ started with n/a’s and gave up for a short time
▪ @nahamsec
▪ 18th
on HackerOne, thanks from Yelp, Shopify, Apple, Uber, Yahoo
▪ Felt burnt out at the beginning of this year, said he wanted to walk away.
Source: Google Bughunter University
1. HACKING IS NOT EASY MONEY
1. HACKING IS NOT EASY MONEY
1. HACKING IS NOT EASY MONEY
2. POC || GTFO
3. YOUR REPUTATION IS GOLD
HackerOne Private Invites:
Private Programs == Less Hackers == $$ (potentially)
3. YOUR REPUTATION IS GOLD (CONT’D)
4. SKILL, OBSERVATION AND RELATIONSHIPS
4. SKILL, OBSERVATION AND RELATIONSHIPS (CONT’D)
Correct Approach
4. SKILL, OBSERVATION AND RELATIONSHIPS (CONT’D)
Wrong Approach
5. PAY IT FORWARD
GETTING STARTED - TOOLS
Fiddler Proxy
GETTING STARTED - SCOPES
- Not help
- Possible red flag
- Sets no expectations
GETTING STARTED - SCOPES (CONT’D)
- This is 1 policy
- Extremely detailed
- Sets clear expectations
- Indicative of a good program
GETTING STARTED - REPORTS
“Better bug reports = better relationships = better bounties”
https://hackerone.com/blog/how-bug-bounty-reports-work
QUESTIONS?
THANK YOU!
@yaworsk
www.leanpub.com/web-hacking-101
www.youtube.com/yaworsk1

More Related Content

What's hot

Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...HackerOne
 
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki ChidaIDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki ChidaCODE BLUE
 
Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!Abhijeth D
 
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...Frans Rosén
 
Bug Bounty Programs For The Web
Bug Bounty Programs For The WebBug Bounty Programs For The Web
Bug Bounty Programs For The WebMichael Coates
 
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win bigLive Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win bigFrans Rosén
 
Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Ajay Negi
 
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 EditionGoing Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 EditionSoroush Dalili
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suitejasonhaddix
 
XSS Magic tricks
XSS Magic tricksXSS Magic tricks
XSS Magic tricksGarethHeyes
 
SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug BountiesOWASP Nagpur
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarOWASP Delhi
 
Asm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchAsm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchLior Rotkovitch
 

What's hot (20)

Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
 
Bug Bounty 101
Bug Bounty 101Bug Bounty 101
Bug Bounty 101
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki ChidaIDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
 
Saying Hello to Bug Bounty
Saying Hello to Bug BountySaying Hello to Bug Bounty
Saying Hello to Bug Bounty
 
Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!
 
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
 
Bug Bounty Programs For The Web
Bug Bounty Programs For The WebBug Bounty Programs For The Web
Bug Bounty Programs For The Web
 
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win bigLive Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
 
Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)
 
Frans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides AhmedabadFrans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides Ahmedabad
 
Building Advanced XSS Vectors
Building Advanced XSS VectorsBuilding Advanced XSS Vectors
Building Advanced XSS Vectors
 
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 EditionGoing Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
 
Hack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhydHack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhyd
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suite
 
XSS Magic tricks
XSS Magic tricksXSS Magic tricks
XSS Magic tricks
 
SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug Bounties
 
Bug Bounty for - Beginners
Bug Bounty for - BeginnersBug Bounty for - Beginners
Bug Bounty for - Beginners
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang Bhatnagar
 
Asm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchAsm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitch
 

Similar to Hackfest presentation.pptx

Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Behrouz Sadeghipour
 
Bug Bounty Career.pdf
Bug Bounty Career.pdfBug Bounty Career.pdf
Bug Bounty Career.pdfVishal318796
 
Bug bounty cash for hack
Bug bounty cash for hackBug bounty cash for hack
Bug bounty cash for hackAtul Shedage
 
If You Can't Beat 'Em, Join 'Em (AppSecUSA)
If You Can't Beat 'Em, Join 'Em (AppSecUSA)If You Can't Beat 'Em, Join 'Em (AppSecUSA)
If You Can't Beat 'Em, Join 'Em (AppSecUSA)bugcrowd
 
Dark Arts Of Social Engineering
Dark Arts Of Social EngineeringDark Arts Of Social Engineering
Dark Arts Of Social EngineeringNutan Kumar Panda
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamMohammed Adam
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsHackerOne
 
Pirate patchfinal
Pirate patchfinalPirate patchfinal
Pirate patchfinalDanni M
 
Top 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsTop 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsHackerOne
 
"How to be a poor man's hacker"
"How to be a poor man's hacker""How to be a poor man's hacker"
"How to be a poor man's hacker"Abhi Nemani
 
using nodejs to count 30 billion requests per day
using nodejs to count 30 billion requests per dayusing nodejs to count 30 billion requests per day
using nodejs to count 30 billion requests per dayWilliam Verbal
 
Preparing Our Children for Success: Finding Resources & Funding To Fuel Their...
Preparing Our Children for Success: Finding Resources & Funding To Fuel Their...Preparing Our Children for Success: Finding Resources & Funding To Fuel Their...
Preparing Our Children for Success: Finding Resources & Funding To Fuel Their...Tshaka Armstrong
 
0-60 Researchers - Jump starting a bug bounty
0-60 Researchers - Jump starting a bug bounty0-60 Researchers - Jump starting a bug bounty
0-60 Researchers - Jump starting a bug bountyTy Sbano
 
Shadow Dave McClure - Stefano Bernardi
Shadow Dave McClure - Stefano BernardiShadow Dave McClure - Stefano Bernardi
Shadow Dave McClure - Stefano BernardiStefano Bernardi
 
Clubhouse: Viral Growth Lessons
Clubhouse: Viral Growth LessonsClubhouse: Viral Growth Lessons
Clubhouse: Viral Growth LessonsYannick Steinmann
 
Using (Free!) App Annie data to optimize your next game
Using (Free!) App Annie data to optimize your next gameUsing (Free!) App Annie data to optimize your next game
Using (Free!) App Annie data to optimize your next gameEric Seufert
 
Using (Free!) AppAnnie Data to Optimize Your Next Game | Eric Seufert
Using (Free!) AppAnnie Data to Optimize Your Next Game | Eric SeufertUsing (Free!) AppAnnie Data to Optimize Your Next Game | Eric Seufert
Using (Free!) AppAnnie Data to Optimize Your Next Game | Eric SeufertJessica Tams
 
Bug Bounty Hunter's Confession
Bug Bounty Hunter's ConfessionBug Bounty Hunter's Confession
Bug Bounty Hunter's ConfessionAMol NAik
 

Similar to Hackfest presentation.pptx (20)

Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties
 
Bug Bounty Career.pdf
Bug Bounty Career.pdfBug Bounty Career.pdf
Bug Bounty Career.pdf
 
Bug bounty cash for hack
Bug bounty cash for hackBug bounty cash for hack
Bug bounty cash for hack
 
If You Can't Beat 'Em, Join 'Em (AppSecUSA)
If You Can't Beat 'Em, Join 'Em (AppSecUSA)If You Can't Beat 'Em, Join 'Em (AppSecUSA)
If You Can't Beat 'Em, Join 'Em (AppSecUSA)
 
Dark Arts Of Social Engineering
Dark Arts Of Social EngineeringDark Arts Of Social Engineering
Dark Arts Of Social Engineering
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
 
Pirate patchfinal
Pirate patchfinalPirate patchfinal
Pirate patchfinal
 
Top 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsTop 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty Programs
 
"How to be a poor man's hacker"
"How to be a poor man's hacker""How to be a poor man's hacker"
"How to be a poor man's hacker"
 
using nodejs to count 30 billion requests per day
using nodejs to count 30 billion requests per dayusing nodejs to count 30 billion requests per day
using nodejs to count 30 billion requests per day
 
Startups
StartupsStartups
Startups
 
Preparing Our Children for Success: Finding Resources & Funding To Fuel Their...
Preparing Our Children for Success: Finding Resources & Funding To Fuel Their...Preparing Our Children for Success: Finding Resources & Funding To Fuel Their...
Preparing Our Children for Success: Finding Resources & Funding To Fuel Their...
 
0-60 Researchers - Jump starting a bug bounty
0-60 Researchers - Jump starting a bug bounty0-60 Researchers - Jump starting a bug bounty
0-60 Researchers - Jump starting a bug bounty
 
Shadow Dave McClure - Stefano Bernardi
Shadow Dave McClure - Stefano BernardiShadow Dave McClure - Stefano Bernardi
Shadow Dave McClure - Stefano Bernardi
 
Clubhouse: Viral Growth Lessons
Clubhouse: Viral Growth LessonsClubhouse: Viral Growth Lessons
Clubhouse: Viral Growth Lessons
 
Sharing My Public Profile
Sharing My Public ProfileSharing My Public Profile
Sharing My Public Profile
 
Using (Free!) App Annie data to optimize your next game
Using (Free!) App Annie data to optimize your next gameUsing (Free!) App Annie data to optimize your next game
Using (Free!) App Annie data to optimize your next game
 
Using (Free!) AppAnnie Data to Optimize Your Next Game | Eric Seufert
Using (Free!) AppAnnie Data to Optimize Your Next Game | Eric SeufertUsing (Free!) AppAnnie Data to Optimize Your Next Game | Eric Seufert
Using (Free!) AppAnnie Data to Optimize Your Next Game | Eric Seufert
 
Bug Bounty Hunter's Confession
Bug Bounty Hunter's ConfessionBug Bounty Hunter's Confession
Bug Bounty Hunter's Confession
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Hackfest presentation.pptx

  • 1. GETTING BEYOND BUG BOUNTY NOOB STATUS @yaworsk www.leanpub.com/web-hacking-101 www.youtube.com/yaworsk1
  • 2. OVERVIEW ▪Who am I and why do you care? ▪What are bug bounties? ▪Lessons learned (with examples) ▪Getting started
  • 3. WHO AM I? ▪ @yaworsk on HackerOne, Twitter, etc. ▪ 11 – months since I started bug bounties ▪ 24 – number of thanks received on HackerOne ▪ 105 – bugs found on HackerOne ▪ 67 – Rank on HackerOne (as of Nov 3, 2016) ▪ 0 – total security experience in November 2015 ▪ Formal education in Public Policy ▪ Self taught “developer” ▪ Web Hacking 101 Book / Hacking Pro Tips
  • 4. WHAT ARE BUG BOUNTIES Source: Bugcrowd
  • 5. WHAT ARE BUG BOUNTIES (CONT’D) ▪ HackerOne (as of Nov 2, 2016) ▪ 32,470 bugs fixed ▪ 3,970 hackers thanked ▪ 155 public programs ▪ ~600+ total programs ▪ Hacktheplanet + Hacktivity ▪ Bugcrowd (as of Mar 31, 2016) ▪ 6,803 paid submissions ▪ 26,782 “researchers” ▪ ~100 public programs (62 shown online as of Nov 2, 2016) ▪ ~180 private programs ▪ Monthly / yearly bonuses + Forum
  • 6. WHAT ARE BUG BOUNTIES (CONT’D) HackerOne Bugcrowd
  • 7. LESSONS LEARNED Hacking is not easy money POC || GTFO Your reputation is gold Skill, observation & relationships Pay it forward
  • 8. 1. HACKING IS NOT EASY MONEY ▪ @ITSecurityGuard ▪ thanks from Uber, Google, Yahoo, Snapchat, Apple CVE ▪ first 7 bugs on Paypal, all dupes and unrewarded ▪ @filedescriptor ▪ over $200k from Twitter alone ▪ started with n/a’s and gave up for a short time ▪ @nahamsec ▪ 18th on HackerOne, thanks from Yelp, Shopify, Apple, Uber, Yahoo ▪ Felt burnt out at the beginning of this year, said he wanted to walk away. Source: Google Bughunter University
  • 9. 1. HACKING IS NOT EASY MONEY
  • 10. 1. HACKING IS NOT EASY MONEY
  • 11. 1. HACKING IS NOT EASY MONEY
  • 12. 2. POC || GTFO
  • 13. 3. YOUR REPUTATION IS GOLD HackerOne Private Invites: Private Programs == Less Hackers == $$ (potentially)
  • 14. 3. YOUR REPUTATION IS GOLD (CONT’D)
  • 15. 4. SKILL, OBSERVATION AND RELATIONSHIPS
  • 16. 4. SKILL, OBSERVATION AND RELATIONSHIPS (CONT’D) Correct Approach
  • 17. 4. SKILL, OBSERVATION AND RELATIONSHIPS (CONT’D) Wrong Approach
  • 18. 5. PAY IT FORWARD
  • 19. GETTING STARTED - TOOLS Fiddler Proxy
  • 20. GETTING STARTED - SCOPES - Not help - Possible red flag - Sets no expectations
  • 21. GETTING STARTED - SCOPES (CONT’D) - This is 1 policy - Extremely detailed - Sets clear expectations - Indicative of a good program
  • 22. GETTING STARTED - REPORTS “Better bug reports = better relationships = better bounties” https://hackerone.com/blog/how-bug-bounty-reports-work