100% found this document useful (1 vote)
779 views15 pages

Getting Started With Bug Bounty PDF

The document provides tips for getting started with bug bounty programs. It discusses what bug bounty programs are, the benefits to companies that run them, and tips for both companies and bug hunters. For companies, it suggests defining the scope, access levels, and whether the program will be private or public. For bug hunters, it recommends learning techniques, being patient, focusing reconnaissance on subdomains, and writing clear vulnerability submissions. The overall document serves as an introduction to bug bounty programs.

Uploaded by

mojoxe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
779 views15 pages

Getting Started With Bug Bounty PDF

The document provides tips for getting started with bug bounty programs. It discusses what bug bounty programs are, the benefits to companies that run them, and tips for both companies and bug hunters. For companies, it suggests defining the scope, access levels, and whether the program will be private or public. For bug hunters, it recommends learning techniques, being patient, focusing reconnaissance on subdomains, and writing clear vulnerability submissions. The overall document serves as an introduction to bug bounty programs.

Uploaded by

mojoxe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

HOW TO GET STARTED WITH

BUG BOUNTY?

EDIS KONSTANTINI
WHO AM I

▸ I work as a senior application security engineer at Bugcrowd, the #1 Crowdsourced


Cybersecurity Platform.

▸ I did/sometimes still do bug bounties in my free time.

▸ My first bug bounty reward was from Offensive Security, on July 12, 2013, a day
before my 15th birthday.

▸ Aside from work stuff, I like hiking and exploring new places. Oh, I also like techno.
WHAT IS THIS TALK ABOUT?
▸ An introduction to the concept of the
Bug Bounty, from a company perspective

▸ Outline the benefits and potential cons of


running a bug bounty program

▸ Tips and suggestions to the bug hunters



The First “Bugs Bounty” program - 1995
Timeline of Bug Bounty programs

bugcrowd.com/programs
What we see lately
There’s a rapid growth in adoption of the bug bounty programs over the past decade. Every day, more organizations are adopting the Bug Bounty Model. That
includes large enterprises as well as small - medium sized enterprises.

Growth Quality Impact


The growing number of organizations
Bug bounties present significant There’s been a huge increase of critical
across industries adopting bug bounty
value comparing to traditional testing vulnerabilities being identified by Bug Bounty
and vulnerability disclosure programs in
methods. programs.
the past year has made it clear that the
crowdsourced security model is here to
stay.
How Bug Bounties Work?
What you need to know before starting a bug bounty program

▸Scope - *.example.com
▸Focus - payment processing
▸Exclusions - 3rd party sites
▸Organization-wide awareness
▸Environment - prod vs staging
▸Access - shared credentials or self signup
▸Decide - Private or Public?

POST LAUNCH - THINGS YOU NEED TO KNOW AFTER LAUNCHING A PROGRAM

▸Commitment
▸Communication
▸Reports
▸Define a Vulnerability Rating Taxonomy 


WHO ARE THE BUG HUNTERS?

▸ All over the world

▸ All levels of experience

▸ Passionate about
security

▸ All ages

▸ Like to challenge

▸ To make internet more Source: Bugcrowd’s State of Bug Bounty 2018 Report
secure!
SOME TIPS AND SUGGESTIONS TO THE BUG HUNTERS

▸ Read. Learn. Practice. Because practice makes it perfect!



As most of the bug bounty programs are related to web targets, the “The
Web Application Hacker’s Handbook” is a must-read book that I suggest to
everyone.

▸ Sharing is caring! This is the motto of many well known researchers that like
to share vulnerabilities they find, and their methodology, so make sure to
read blog posts of other hackers.

▸ Check online materials . Watch tutorials and videos related to hacking. 



Bug Bounty Hunting Methodology v3 — Jason Haddix is a great example.

▸ Be patient. Because, it will take time to find the first valid bug. Don’t be
disappointed. Duplicates are everywhere!

▸ Approaching a target: Let’s assume that the program has a large scope
(*.example.com), don’t waste your time on main site if you are late to the party as
chances are low that you’ll find anything in the main site(as everyone probably went
over it so many times).

▸ Recon: Start to perform reconnaissance to find subdomains. 



Find subdomains through various tools like Sublist3r etc.

▸ Use Nmap, as it will certainly help to find hosts running on non-standard ports that may
be vulnerable to critical issues.

▸ Review the services and ports found by recon. Check for the infrastructure of the
application. Try to understand how they handle sessions/authentication, check for
CSRF (whether if they have some protection for it, i.e csrf token), test for IDOR’s. Take
a look at how they filter input versus encoding etc.

▸ If you get stuck at some point, ask for help. The bug bounty community helps each
other, but before asking, make sure you check all the possibilities to resolve it.
The value of writing good submission

▸ Keep the description short and simple


▸ Show full proof-of-concept
▸ Explain the potential impact
▸ Don’t add video unless it has some good music in
background
▸ Provide remediation advice



Thanks y’all! 

Questions?

You might also like