SlideShare a Scribd company logo
5
Most read
6
Most read
14
Most read
Bug Bounty
Pawn to Earn

Vinod Tiwari
@war_crack
Agenda
•
•
•
•
•
•
•
•

Introduction
Why #BBPs?
Who are they?
Prerequisites
Develop your own approach
Tools
Avoid Duplicates
Finding new #BBPs
Introduction
• Rewards(Not always) & Credits for finding
loopholes
• Bugs in application, Network, product etc.
• Should be Responsible disclosure
Why #BBPs?
• Saves money getting job done by worldwide
researchers
• Different kind of bugs which owner never had
thought of
• Work directly with researchers
• It was all started by Netscape in 1995
Who are they?
•
•
•
•
•
•

Google
Facebook
Mozilla
ATT
Barracuda
List at
– https://bugcrowd.com/list-of-bug-bountyprograms
Prerequisite
• You should read these,
– OWASP Testing Guide V3
– The Web application hacker’s handbook
– RFC 2616 - HTTP /1.1

• Have hands-on with few simulators e.g.
– Mutillidae
– DVWA
– etc.
Approach
• Develop your own
• Understand the Scope
• Gather Information about domain, services,
CMS & structures
• Understand the logic
• Avoid using automated tools
• Have standard template to report
Tools Required
• Proxy: Burp Suite, Fiddler etc.
• Browser extensions & Add-ons (Firefox)
– Live HTTP header
– Firebug/ Web developer tool
– ClickJacking Defense
– Wapplyzer
– User agent Switcher
– Many more
Common Security Flaws
Vulnerabilities

9%

14%

7%

Injection
Session flaws
XSS

12%

16%

IDOR
Security Misconfiguration
Sensitive Data Exposure
CSRF

16%
19%

7%

Other
Avoid Duplicates
• Try on Sub domains
• Standard templates for common bugs can
save time
• Try with business logic flaws
– https://www.owasp.org/index.php/Testing_for_b
usiness_logic_(OWASP-BL-001)
Submission Format
•
•
•
•
•
•
•

Vulnerability Name:
Description:
Impact:
Vulnerable Link/Product:
Environment tested on:
POC (Screenshots, Video):
References if any
Finding New #BBPs
• Google can help
• Approach them
• FUD will always help
References
• http://www.slideshare.net/mehimansu/bugbounty-for-beginners?from_search=1
• http://www.slideshare.net/goldshlager19/nirgoldshlager-killing-a-bug-bounty-programtwice-hack-in-the-box-2012?from_search=9
Questions?

• Thanks!


Twitter: @war_crack
email: nikivin.vinod@gmail.com

More Related Content

PDF
PPTX
Bug Bounty 101
PDF
Bug Bounty Blueprint : A Beginner's Guide
PPTX
Buffer overflow attacks
PDF
Bug Bounty Basics
PPTX
What is Penetration Testing?
PPT
Introduction To OWASP
PPTX
Hacking vs cracking
Bug Bounty 101
Bug Bounty Blueprint : A Beginner's Guide
Buffer overflow attacks
Bug Bounty Basics
What is Penetration Testing?
Introduction To OWASP
Hacking vs cracking

What's hot (20)

PDF
PDF
Bug Bounty Hunter Methodology - Nullcon 2016
PPTX
Bug Bounty for - Beginners
PPTX
Security testing
PPTX
Malware analysis
PDF
Web Application Penetration Testing
PPTX
Bug Bounty - Play For Money
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PDF
Bug bounty null_owasp_2k17
PPT
Application Security
PDF
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
PPT
Introduction to Web Application Penetration Testing
PPTX
Cyber security
PPTX
Introduction to penetration testing
PPTX
Introduction to Malware Analysis
PPTX
Saying Hello to Bug Bounty
PPTX
Security testing
PDF
Web Application Security 101
PDF
Secure coding presentation Oct 3 2020
PDF
Malware and security
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty for - Beginners
Security testing
Malware analysis
Web Application Penetration Testing
Bug Bounty - Play For Money
Ethical Hacking n VAPT presentation by Suvrat jain
Bug bounty null_owasp_2k17
Application Security
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Introduction to Web Application Penetration Testing
Cyber security
Introduction to penetration testing
Introduction to Malware Analysis
Saying Hello to Bug Bounty
Security testing
Web Application Security 101
Secure coding presentation Oct 3 2020
Malware and security
Ad

Similar to Bug bounty (20)

PPTX
Basics of getting Into Bug Bounty Hunting
PPTX
Web Application Security And Getting Into Bug Bounties
PPTX
LKNOG3 - Bug Bounty
PPTX
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
PPTX
Getting_Started_with_Bug_Bounty program.
PPTX
ABCD of Bugbounty.pptx
PPTX
7 Bug Bounty Myths, BUSTED
PDF
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
PDF
Owasp LA
PDF
BSides LA/PDX
PDF
[Webinar] The Art & Value of Bug Bounty Programs
PDF
Hunting bugs - C0r0n4con
PPTX
Bug bounties - cén scéal?
PPTX
Bug bounty cash for hack
PDF
Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at Hack...
PDF
Webinar kym-casey-bug bounty tipping point webcast - po edits
PDF
Yet another talk on bug bounty
PPTX
Crypto Night at CSUS - Bug Bounties
PDF
Bug Bounty Tipping Point: Strength in Numbers
PDF
Bug Bounties and The Path to Secure Software by 451 Research
Basics of getting Into Bug Bounty Hunting
Web Application Security And Getting Into Bug Bounties
LKNOG3 - Bug Bounty
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
Getting_Started_with_Bug_Bounty program.
ABCD of Bugbounty.pptx
7 Bug Bounty Myths, BUSTED
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Owasp LA
BSides LA/PDX
[Webinar] The Art & Value of Bug Bounty Programs
Hunting bugs - C0r0n4con
Bug bounties - cén scéal?
Bug bounty cash for hack
Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at Hack...
Webinar kym-casey-bug bounty tipping point webcast - po edits
Yet another talk on bug bounty
Crypto Night at CSUS - Bug Bounties
Bug Bounty Tipping Point: Strength in Numbers
Bug Bounties and The Path to Secure Software by 451 Research
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction

Bug bounty