Bug Bounty
Hunter's Confession
About Me
Web App Guy
Google, Facebook, Twitter
Member of garage4hackers.com
HackIM CTF Team member
@amolnaik4
Dream
Hall of Fame
Inspiration
Plan
I know XSS
Payloads available
Target sub-domains, example codes
Bug
What was it ?
XHR call
No GET/POST payload
Victim types XSS payload
Self-XSSSelf-XSS
Solution
Use UI Redressing
HTML5 Drag-Drop
Thanks to @Lavakumar
PoC
What Next ?
Clickjacking
Source: Imperva.com
Why Clickjacking ?
No one found it in Bounty program
Easy to find & exploit
– Look for iFramable Pages
– And interesting Action
HTML5 Drag-Drop
Bugs
Remove Google Books
More...
Remove Google Health, Orkut
And More...
Facebook ClickJacking
CSRF
Source: @johnwilander
CSRF in Bounty Programs
Actions with NO CSRF Token
– Simple
Actions with CSRF Token
– Remove token
– Garbage token
Suggestions
Participate in Bounty program
– To learn
– To earn
– Fame
Not only XSS
Use manual testing
Resources
Bounty Programs
– List of active bug bounty programs:
– http://blog.bugcrowd.com/list-of-active-bug-bounty-programs/
Read the scope !!
Tools
– Firefox
– Tamper Data
– Live HTTP Headers
– And many more ...
And...
Have a Dream
Questions
AMol NAik
http://amolnaik4.blogspot.com
@amolnaik4

Bug Bounty Hunter's Confession