SlideShare a Scribd company logo
1 of 19
HackerOne
X
IoT Lab
01
Intro to HackerOne
Introduction To Bug
Bounties
Recon
02
03
04
05
Attacking single
Domains
Case Study of My
Findings
06 Ask your Questions?
Intro to HackerOne
01
HackerOne
HackerOne specializes in cybersecurity, employing ethical hackers to enhance attack
resistance by discovering and closing gaps in digital defenses through asset discovery,
continuous assessment, and process improvement. Through its bug bounty platform,
organizations can incentivize ethical hackers to identify and report vulnerabilities,
bolstering overall security posture.
HackerOne Ambassador Program
● The HackerOne Ambassador Program is a community initiative that engages
passionate individuals who are enthusiastic about cybersecurity and ethical
hacking.
● Ambassadors for HackerOne spreads awareness about bug bounty programs, and
promoting responsible disclosure practices.
● Ambassadors contribute to educational content, host workshops or events, and
serve as mentors to aspiring hackers.
[~]$ whoami
✔ Brand Ambassador at Hackerone.
✔ Hackerone verified clear hacker.
✔ Security Researcher at Hackerone.
✔ Lead security Engineer at Threatsys
Technologies Pvt. Ltd.
✔ Hall of Fames at Microsoft, Google,
Twitter, Shopify and 400+ bug reports.
Shakti Ranjan Mohanty
Saying Hello
To Bug Bounty
Shakti Ranjan Mohanty (3ncryptsaan)
Introduction To Bug
Bounties
02
Bug Bounty ??
A bug bounty is a monetary reward given to ethical hackers for successfully discovering
and reporting a vulnerability or bug to the application's developer.
What is Bug Bounty Program ?
Bug bounty programs allow independent security researchers to report bugs to an
organization and receive rewards or compensation.
Popular Platforms ?
Hackerone, Bugcrowd, Yeswehack, Intigriti, Yogosha, Synack, Immunefi etc.
Cvss, CIA?
Eligibility ?
How to choose a Target ?
Scope:
Generally, we have two type of scopes in Web apps ( single or main domain , wildscope
domain)
Bounty Amount:
Bounty amount matters as all have different prospective for money. People often wants high
payout targets.
Response Time:
Slow response time will lead to frustration and laziness, as a hunter we always want quick
responses.
Platform:
We will always love a place where we can track everything about our bug report, this is
what lacks on a self hosted Bug bounty program.
Policy:
Reading out the rules by program and acknowledging what they focus on
Recon
03
Recon on wild scope target
Bruteforcing Subdomains?
For bruteforcing subdomains of the target, we can use Assetfinder, Subfinder , Amass etc.
For better result use all
subfinder -d example.com -o sub.txt
assetfinder example.com --subs-only | tee -a asset.txt
Filtering Out Unique ones
From the above , we may have got the same results on both file, To filter unique ones For better result use all.
cat *.txt | sort -u | tee -a unique.txt
Finger printing the live domains
cat final.txt | httpx --title -tech-detect -status-code --follow-redirect
Recon on wild scope target
Content discovery
There are lots of way to gather contents.
a- Google Dorking
inurl:
site:
intext:
index of "value"
intitle:
b- Fuzzing directory
python3 dirsearch.py -u example.com
c- Archieve pages
Waybackurls example.com
Attacking single
domain Target
04
Attacking single domain Target
• Analyzing The requests and
Response
• Observing the app more than anyone
• Analyzing the Js files for
hidden endpoints
• Trying to access premium
features for free
• xss, injections, ssrf, Access
control issues etc.
Case Studies of My
findings
05
My Findings
https://medium.com/@shakti.gtp/an-
out-of-scope-domain-leads-to-a-
critical-bug-1500-f228d2c7db4b
Finding Two
https://medium.com/@shakti.gtp/if-
its-a-feature-let-s-abuse-it-for-750-
19cfb9848d4b
Finding One
Takeaways
❑ Before reporting Don't think that the bug
may have been reported, there is always
a bug waiting for you.
❑ Report and Forget, Don't expect Too
much from that.
❑ Don't learn bug bounty, Learn
Cybersecurity. Bug bounty is just a part
of it.
Ask your Questions ?
06
CREDITS: This presentation template was created
by Slidesgo, including icons by Flaticon,
infographics & images by Freepik and
illustrations by Stories
THANKS!
Do you have any questions?
shakti.gtp@gmail.com
+91 7008978755
https://twitter.com/3ncryptSaan
https://www.linkedin.com/in/shakti-
ranjan-mohanty/
https://www.instagram.com/3ncryptsaa
n

More Related Content

Similar to HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT University!

CONFidence 2018: Behind the scene of malware operators. Insights and counterm...
CONFidence 2018: Behind the scene of malware operators. Insights and counterm...CONFidence 2018: Behind the scene of malware operators. Insights and counterm...
CONFidence 2018: Behind the scene of malware operators. Insights and counterm...PROIDEA
 
Lab-3 Cyber Threat Analysis In Lab-3, you will do some c.docx
Lab-3 Cyber Threat Analysis        In Lab-3, you will do some c.docxLab-3 Cyber Threat Analysis        In Lab-3, you will do some c.docx
Lab-3 Cyber Threat Analysis In Lab-3, you will do some c.docxLaticiaGrissomzz
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisAntonio Parata
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptxChi En (Ashley) Shen
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)Scott Sutherland
 
Investigating the Universe of Moral Hacking.pdf
Investigating the Universe of Moral Hacking.pdfInvestigating the Universe of Moral Hacking.pdf
Investigating the Universe of Moral Hacking.pdfnehash4637
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfDipak Tiwari
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinPhillip Maddux
 
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersKeynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersidsecconf
 
Professional Hackers
Professional HackersProfessional Hackers
Professional HackersJim Geovedi
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinPhillip Maddux
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Shubham Gupta
 
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...GeekPwn Keen
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!ThreatReel Podcast
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 

Similar to HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT University! (20)

CONFidence 2018: Behind the scene of malware operators. Insights and counterm...
CONFidence 2018: Behind the scene of malware operators. Insights and counterm...CONFidence 2018: Behind the scene of malware operators. Insights and counterm...
CONFidence 2018: Behind the scene of malware operators. Insights and counterm...
 
Lab-3 Cyber Threat Analysis In Lab-3, you will do some c.docx
Lab-3 Cyber Threat Analysis        In Lab-3, you will do some c.docxLab-3 Cyber Threat Analysis        In Lab-3, you will do some c.docx
Lab-3 Cyber Threat Analysis In Lab-3, you will do some c.docx
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
 
Investigating the Universe of Moral Hacking.pdf
Investigating the Universe of Moral Hacking.pdfInvestigating the Universe of Moral Hacking.pdf
Investigating the Universe of Moral Hacking.pdf
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
 
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackersKeynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackers
 
Professional Hackers
Professional HackersProfessional Hackers
Professional Hackers
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 

Recently uploaded

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxRugvedSathawane
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfElizabeth Walsh
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 

HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT University!

  • 2. 01 Intro to HackerOne Introduction To Bug Bounties Recon 02 03 04 05 Attacking single Domains Case Study of My Findings 06 Ask your Questions?
  • 4. HackerOne HackerOne specializes in cybersecurity, employing ethical hackers to enhance attack resistance by discovering and closing gaps in digital defenses through asset discovery, continuous assessment, and process improvement. Through its bug bounty platform, organizations can incentivize ethical hackers to identify and report vulnerabilities, bolstering overall security posture. HackerOne Ambassador Program ● The HackerOne Ambassador Program is a community initiative that engages passionate individuals who are enthusiastic about cybersecurity and ethical hacking. ● Ambassadors for HackerOne spreads awareness about bug bounty programs, and promoting responsible disclosure practices. ● Ambassadors contribute to educational content, host workshops or events, and serve as mentors to aspiring hackers.
  • 5. [~]$ whoami ✔ Brand Ambassador at Hackerone. ✔ Hackerone verified clear hacker. ✔ Security Researcher at Hackerone. ✔ Lead security Engineer at Threatsys Technologies Pvt. Ltd. ✔ Hall of Fames at Microsoft, Google, Twitter, Shopify and 400+ bug reports. Shakti Ranjan Mohanty
  • 6. Saying Hello To Bug Bounty Shakti Ranjan Mohanty (3ncryptsaan)
  • 8. Bug Bounty ?? A bug bounty is a monetary reward given to ethical hackers for successfully discovering and reporting a vulnerability or bug to the application's developer. What is Bug Bounty Program ? Bug bounty programs allow independent security researchers to report bugs to an organization and receive rewards or compensation. Popular Platforms ? Hackerone, Bugcrowd, Yeswehack, Intigriti, Yogosha, Synack, Immunefi etc. Cvss, CIA? Eligibility ?
  • 9. How to choose a Target ? Scope: Generally, we have two type of scopes in Web apps ( single or main domain , wildscope domain) Bounty Amount: Bounty amount matters as all have different prospective for money. People often wants high payout targets. Response Time: Slow response time will lead to frustration and laziness, as a hunter we always want quick responses. Platform: We will always love a place where we can track everything about our bug report, this is what lacks on a self hosted Bug bounty program. Policy: Reading out the rules by program and acknowledging what they focus on
  • 11. Recon on wild scope target Bruteforcing Subdomains? For bruteforcing subdomains of the target, we can use Assetfinder, Subfinder , Amass etc. For better result use all subfinder -d example.com -o sub.txt assetfinder example.com --subs-only | tee -a asset.txt Filtering Out Unique ones From the above , we may have got the same results on both file, To filter unique ones For better result use all. cat *.txt | sort -u | tee -a unique.txt Finger printing the live domains cat final.txt | httpx --title -tech-detect -status-code --follow-redirect
  • 12. Recon on wild scope target Content discovery There are lots of way to gather contents. a- Google Dorking inurl: site: intext: index of "value" intitle: b- Fuzzing directory python3 dirsearch.py -u example.com c- Archieve pages Waybackurls example.com
  • 14. Attacking single domain Target • Analyzing The requests and Response • Observing the app more than anyone • Analyzing the Js files for hidden endpoints • Trying to access premium features for free • xss, injections, ssrf, Access control issues etc.
  • 15. Case Studies of My findings 05
  • 17. Takeaways ❑ Before reporting Don't think that the bug may have been reported, there is always a bug waiting for you. ❑ Report and Forget, Don't expect Too much from that. ❑ Don't learn bug bounty, Learn Cybersecurity. Bug bounty is just a part of it.
  • 19. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, infographics & images by Freepik and illustrations by Stories THANKS! Do you have any questions? shakti.gtp@gmail.com +91 7008978755 https://twitter.com/3ncryptSaan https://www.linkedin.com/in/shakti- ranjan-mohanty/ https://www.instagram.com/3ncryptsaa n