SlideShare a Scribd company logo
BUGBOUNTY
PROGRAMS
Omar Benbouazza
Madrid | November 30 - December 1, 2018
Bugbounty Programs - Codemotion
• InfoSecurity Leader at IKEA
• More than 15 years experience.
• Technology, Hacking, Bug Bounties, Investigation, Threats…
• Organizer of RootedCON Security Conference (~2000 hackers)
• Former EY, Nokia and Microsoft
Bugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
6
7
Bugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
• Cybercrime is raising, increasing the financial impact
• Cost for defending companies is huge
• Infrastructure complexity is growing
• Some talent issues, you don’t have the best!
MANAGE
MANAGE
• PENTESTING Activities
• Compliance / Standards
• Internal/External Audits
• Secure Coding (SecDevOps)
• HACKING COMMUNITY!!
(Responsible Disclosure / Bug Bounty)
• Result guarantee: it is "paid" only for real vulnerabilities
• AGILE and FLEXIBLE: Switch ON/OFF
• Talented and Skilled people, don’t matter what technology
• Responsible Disclosure Program
• BugBounty Program
• Pentesting != BugBounty
✓ Plan the Budget $$$
✓ Choose the Platform
✓ Integrations: Slack, JIRA…
✓ Think about the Scope / Targeted solutions
✓ Team / Teams supporting
✓ TEST Security before…
✓ Stablish criteria for payments beforehand
✓ Define SLA’s
✓ Write a policy for your program, what is not allowed!
✓ Monthly Committee
REPORT
REJECT
ACCEPTED
ORIGINAL BUG?
(Not duplicated)
IN SCOPE?
WEB
MOBILE APPS
YES
NO
VALID REPORT?
(Reproducible)
INFORM
hackerTEST
REQUEST INFO to
hacker
FW TO TEAM
+ INFO NEEDED?
WON’T FIXFIX
THANKS
to hacker
ELEGIBLE?
$$$
THANKS
to hacker
CHECK
THANKS
to hacker
INFORM
hacker
BB
IT
SEC
INFORM
hacker
WORKING ON REPORT
Bugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
* The 2018 H1 Report
* The 2018 H1 Report
* The 2018 H1 Report
Bugbounty Programs - Codemotion
Limit Information Disclosure
Bugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
• Technical Description:
✓ We want to know what you can do, and how you can use it
✓ We want to know an exploitation vector
✓ CVSS (Common Vulnerability Scoring System)
✓ We want steps to reproduce the issue
• Script code
• URL (SQLi – with getting RDBMS version, XSS – with alert)
• Packet sample (pcap)
• Screenshots
• Etc.
Bugbounty Programs - Codemotion
• NO THANKS:
✓ Attachments: PDF, DOC, EXE…
✓ Acunetix Reports (Automated scanners)
✓ Non exploitable bugs /* self XSS */
✓ Bugs without evidences
✓ Bugs based on blog articles of someone…
Bugbounty Programs - Codemotion
• Create a DB, make easy to find stuff
• Check before you process
• Avoid duplicates… later will be complicated
• Evaluate the risk
• If some information is missing, contact the researcher!
Bugbounty Programs - Codemotion
• Web Services
✓ All Nokia sites are in scope
✓ Marketing Sites
• Nokia/HERE Apps (Lumia/Asha)
• OS Vulnerabilities (Lumia/Asha)
• Firmware
• Client Software
• Dealers / Online Shops
• Enterprise-Corporate Systems
• Non-Nokia Services
CASE STUDIES
Bugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
Bugbounty Programs - Codemotion
THANKS!

More Related Content

PDF
Omar Benbouazza | Bugbounty Programs | Codemotion Madrid 2018
PPTX
Programatori cu capul in nori
PPTX
Building a Hacker Resistant Network
PPTX
Aegis Personal Cybersecurity 101
PPTX
ThingStudio_persys17
PPTX
How to make the move towards hybrid cloud computing
PPTX
Picking the right Single Sign On Tool to protect your network
PPTX
Understanding passwordless technologies
Omar Benbouazza | Bugbounty Programs | Codemotion Madrid 2018
Programatori cu capul in nori
Building a Hacker Resistant Network
Aegis Personal Cybersecurity 101
ThingStudio_persys17
How to make the move towards hybrid cloud computing
Picking the right Single Sign On Tool to protect your network
Understanding passwordless technologies

What's hot (17)

PPT
How to keep track of cloud costs
PDF
Grega Pušnik: The development of IOT products and concern for user privacy
PDF
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
PDF
Things I wish I'd known before I started with Microservices - GOTO Amsterdam ...
PDF
ArcBlock Presents 5 Winning Factors to Building a Successful DApp
PPTX
Using OpenStack to Control VM Chaos
PPTX
How to Keep Your Databases Secure in Just Minutes a Day
PDF
Moodle self-hosting - some things to consider Mike Hughes, Amanda Doughty, ...
PDF
A Breathless Tour of Blockchain
DOCX
Dc resume
PPTX
Plain talk about security public - ms1
PDF
Visualizing Threats: Network Visualization for Cyber Security
PDF
Solving problems with authentication
PDF
Liferay cloud services lnlug-6-march-2014
PPTX
Career in IT - HMTIF UB Platform 2014
PPTX
Cybersecurity Careers: Setting Yourself Apart in a Competitive Field
PPTX
MultPoint Ltd.company overview 2014 3214 short version
How to keep track of cloud costs
Grega Pušnik: The development of IOT products and concern for user privacy
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Things I wish I'd known before I started with Microservices - GOTO Amsterdam ...
ArcBlock Presents 5 Winning Factors to Building a Successful DApp
Using OpenStack to Control VM Chaos
How to Keep Your Databases Secure in Just Minutes a Day
Moodle self-hosting - some things to consider Mike Hughes, Amanda Doughty, ...
A Breathless Tour of Blockchain
Dc resume
Plain talk about security public - ms1
Visualizing Threats: Network Visualization for Cyber Security
Solving problems with authentication
Liferay cloud services lnlug-6-march-2014
Career in IT - HMTIF UB Platform 2014
Cybersecurity Careers: Setting Yourself Apart in a Competitive Field
MultPoint Ltd.company overview 2014 3214 short version
Ad

Similar to Bugbounty Programs - Codemotion (20)

PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PDF
IT security for all. Bootcamp slides
PDF
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
PDF
ProdSec: A Technical Approach
PPTX
Security for Humans
PDF
DevOps and DevSecOps, Incident Management
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PPTX
Protect your Database with Data Masking & Enforced Version Control
PPTX
Pentesting Tips: Beyond Automated Testing
PPTX
Security For Humans
PDF
C days2015
PPTX
7 Secrets to Becoming a Citrix Hero
PPTX
Open Source Defense for Edge 2017
PPTX
Why defensive research is sexy too.. … and a real sign of skill
PPTX
Threat Modeling All Day!
PPT
JDA: Building an Open Source Center of Excellence
PPTX
For Business's Sake, Let's focus on AppSec
PDF
AppSec in an Agile World
PDF
HIS 2017 Paul Sherwood- towards trustable software
PDF
The Lost Tales of Platform Design (February 2017)
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
IT security for all. Bootcamp slides
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
ProdSec: A Technical Approach
Security for Humans
DevOps and DevSecOps, Incident Management
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Protect your Database with Data Masking & Enforced Version Control
Pentesting Tips: Beyond Automated Testing
Security For Humans
C days2015
7 Secrets to Becoming a Citrix Hero
Open Source Defense for Edge 2017
Why defensive research is sexy too.. … and a real sign of skill
Threat Modeling All Day!
JDA: Building an Open Source Center of Excellence
For Business's Sake, Let's focus on AppSec
AppSec in an Agile World
HIS 2017 Paul Sherwood- towards trustable software
The Lost Tales of Platform Design (February 2017)
Ad

Recently uploaded (20)

PPTX
Effective_Handling_Information_Presentation.pptx
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
Anesthesia and it's stage with mnemonic and images
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PPTX
water for all cao bang - a charity project
PPTX
Hydrogel Based delivery Cancer Treatment
PDF
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
PPTX
lesson6-211001025531lesson plan ppt.pptx
PPTX
Tour Presentation Educational Activity.pptx
PPTX
An Unlikely Response 08 10 2025.pptx
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PPTX
worship songs, in any order, compilation
PPTX
chapter8-180915055454bycuufucdghrwtrt.pptx
PDF
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
PPTX
Primary and secondary sources, and history
PPTX
Intro to ISO 9001 2015.pptx wareness raising
Effective_Handling_Information_Presentation.pptx
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
oil_refinery_presentation_v1 sllfmfls.pdf
Anesthesia and it's stage with mnemonic and images
Emphasizing It's Not The End 08 06 2025.pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
water for all cao bang - a charity project
Hydrogel Based delivery Cancer Treatment
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
lesson6-211001025531lesson plan ppt.pptx
Tour Presentation Educational Activity.pptx
An Unlikely Response 08 10 2025.pptx
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
Impressionism_PostImpressionism_Presentation.pptx
worship songs, in any order, compilation
chapter8-180915055454bycuufucdghrwtrt.pptx
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
Primary and secondary sources, and history
Intro to ISO 9001 2015.pptx wareness raising

Bugbounty Programs - Codemotion

  • 1. BUGBOUNTY PROGRAMS Omar Benbouazza Madrid | November 30 - December 1, 2018
  • 3. • InfoSecurity Leader at IKEA • More than 15 years experience. • Technology, Hacking, Bug Bounties, Investigation, Threats… • Organizer of RootedCON Security Conference (~2000 hackers) • Former EY, Nokia and Microsoft
  • 6. 6
  • 7. 7
  • 10. • Cybercrime is raising, increasing the financial impact • Cost for defending companies is huge • Infrastructure complexity is growing • Some talent issues, you don’t have the best! MANAGE
  • 12. • PENTESTING Activities • Compliance / Standards • Internal/External Audits • Secure Coding (SecDevOps) • HACKING COMMUNITY!! (Responsible Disclosure / Bug Bounty)
  • 13. • Result guarantee: it is "paid" only for real vulnerabilities • AGILE and FLEXIBLE: Switch ON/OFF • Talented and Skilled people, don’t matter what technology
  • 14. • Responsible Disclosure Program • BugBounty Program • Pentesting != BugBounty
  • 15. ✓ Plan the Budget $$$ ✓ Choose the Platform ✓ Integrations: Slack, JIRA… ✓ Think about the Scope / Targeted solutions ✓ Team / Teams supporting ✓ TEST Security before… ✓ Stablish criteria for payments beforehand ✓ Define SLA’s ✓ Write a policy for your program, what is not allowed! ✓ Monthly Committee
  • 16. REPORT REJECT ACCEPTED ORIGINAL BUG? (Not duplicated) IN SCOPE? WEB MOBILE APPS YES NO VALID REPORT? (Reproducible) INFORM hackerTEST REQUEST INFO to hacker FW TO TEAM + INFO NEEDED? WON’T FIXFIX THANKS to hacker ELEGIBLE? $$$ THANKS to hacker CHECK THANKS to hacker INFORM hacker BB IT SEC INFORM hacker WORKING ON REPORT
  • 20. * The 2018 H1 Report
  • 21. * The 2018 H1 Report
  • 22. * The 2018 H1 Report
  • 28. • Technical Description: ✓ We want to know what you can do, and how you can use it ✓ We want to know an exploitation vector ✓ CVSS (Common Vulnerability Scoring System) ✓ We want steps to reproduce the issue • Script code • URL (SQLi – with getting RDBMS version, XSS – with alert) • Packet sample (pcap) • Screenshots • Etc.
  • 30. • NO THANKS: ✓ Attachments: PDF, DOC, EXE… ✓ Acunetix Reports (Automated scanners) ✓ Non exploitable bugs /* self XSS */ ✓ Bugs without evidences ✓ Bugs based on blog articles of someone…
  • 32. • Create a DB, make easy to find stuff • Check before you process • Avoid duplicates… later will be complicated • Evaluate the risk • If some information is missing, contact the researcher!
  • 34. • Web Services ✓ All Nokia sites are in scope ✓ Marketing Sites • Nokia/HERE Apps (Lumia/Asha) • OS Vulnerabilities (Lumia/Asha) • Firmware • Client Software
  • 35. • Dealers / Online Shops • Enterprise-Corporate Systems • Non-Nokia Services