SlideShare a Scribd company logo
How to do well with Bug
bounties?
-- ABHIJETH D
Agenda
 Introduction
 Finding the right target
 Information gathering
 Approach to discover vulnerabilities
 Using various vulnerability scanners
 POC writing
 Few sample potential RCEs
 Annnd thennnnnnn bug hunting
www.abhijeth.comwww.null.co.in@abhijeth
@nullhyd
Hello
Time to brag:
Security Consultant at TCS for bread and
butter
Love speaking and training
Got lucky with Google, Y!, Microsoft,
Twitter .. Etc
Love anime and politics !!
Trying to contribute to the security
community and start-ups in Hyd.
 Abhijeth Dugginapeddi
 www.abhijeth.com
 @abhijeth
 Fb.com/abhijethd
What is a bug
bounty program
YOU FIND A VULNERABILITY
DO SOME R&D
GET FREE T SHIRTS
FREE SWAG
MOST IMPORTANTLY EARN
SOME BOUNTY
“HALL OF FAME”
”
“Why do companies run such
programs
ARE THEY DUMB TO PAY HACKERS??
Free publicity
Cost efficient
Improve security
Where to get the list !!!
Lets start …!!
 How do we start ?? Which hall of fame do you want to get into ?
Lets test google.com
The road not taken
 Start with easier sites
 Find sites which were not tested by many
 New bug bounty program
leads to better success
 Find the right domain to find a bug.
Finding sub.sub.sub.domain
It is always important to find a sub domain
They say ..!!! BBP is all about XSS
A better approach
 Mixed content
 Click Jacking
 Logical by pass
 Bruteforce
 Directory Listing
 Open redirects
 And When don’t “pay” don’t invest much time!! Remember even a CJ
can give you a HOF
Few Tips
 Next time you get a single vuln in diff domains, make sure you submit
"individual" reports.
 It is always important to find the “right” domain to attack
 A right sub domain can give you a HOF in less than an hour
 Understand the logic before you start your magic
 It is very very very important to write a neat POC.
 Presentation skills do matter!!!
My Dupe Stories….!! 
First Magento
Then Facebook and Yahoo
Even Google
What do you realize??
How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth
How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth
Special Thanks
Harsha Vardhan
Boppana
For sharing his secrets
Gineesh George
In office, fortunately the only guy
who can “hack”
Lalith and Varun
Kakumani
My partners :D
Thanks a lot
dabhijeth@yahoo.co.in
www.Abhijeth.com
@abhijeth
Facebook.com/abhijeth

More Related Content

PDF
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
PPTX
Bug Bounty - Play For Money
PDF
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
PPTX
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
PDF
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
PPTX
brighton final.pptx
PDF
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
PPTX
LKNOG3 - Bug Bounty
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Bug Bounty - Play For Money
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Android "Fight Club" : In pursuit of APPiness -- null Humla Delhi Chapter
brighton final.pptx
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
LKNOG3 - Bug Bounty

What's hot (18)

PDF
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
PDF
Empire Work shop
PPTX
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
PPTX
2018 Hacked Website Trends
PPTX
Pubcon Las Vegas 2016 - Penguin 4.0
PPTX
Webinar: CWAF for Mid Market/Enterprise Organizations
PDF
Blue team reboot - HackFest
PDF
Hack the book Mini
PDF
Purple View
ODP
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
PDF
How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)
PPTX
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
PDF
A Journey Into Pen-tester land: Myths or Facts!
PDF
Jason Yee - Chaos! - Codemotion Rome 2019
PDF
Progressive Web Apps #TheDevConfSP
PDF
Yet another talk on bug bounty
PDF
Identity in the Future of Embeddables & Wearables
PPTX
What is hacking
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
Empire Work shop
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
2018 Hacked Website Trends
Pubcon Las Vegas 2016 - Penguin 4.0
Webinar: CWAF for Mid Market/Enterprise Organizations
Blue team reboot - HackFest
Hack the book Mini
Purple View
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
How To Spot a Wolf in Sheep's Clothing (a.k.a. Account Takeover)
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
A Journey Into Pen-tester land: Myths or Facts!
Jason Yee - Chaos! - Codemotion Rome 2019
Progressive Web Apps #TheDevConfSP
Yet another talk on bug bounty
Identity in the Future of Embeddables & Wearables
What is hacking
Ad

Viewers also liked (7)

PDF
Bug Bounty - Hackers Job
PDF
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
PDF
Bug bounty null_owasp_2k17
PPTX
Bug Bounty for - Beginners
PDF
Bug Bounty Hunter's Manifesto V1.0
PDF
PPTX
Bug Bounty #Defconlucknow2016
Bug Bounty - Hackers Job
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
Bug bounty null_owasp_2k17
Bug Bounty for - Beginners
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty #Defconlucknow2016
Ad

Similar to How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth (20)

PDF
Testers, get into security bug bounties!
PPTX
Saying Hello to Bug Bounty
PPTX
Basics of getting Into Bug Bounty Hunting
PPTX
HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...
PPTX
Getting_Started_with_Bug_Bounty program.
PPTX
Bug bounties - cén scéal?
PPTX
Nbt con december-2014-slides
PPTX
Nbt con december-2014-slides
PPTX
Recon and Bug Bounties - What a great love story!
PPTX
Hacking WebApps for fun and profit : how to approach a target?
PPTX
Web Application Security And Getting Into Bug Bounties
PDF
Bug bounty programs
PDF
Bug Bounty Hunter Methodology - Nullcon 2016
PDF
BugBounty Roadmap with Mohammed Adam
PDF
Bug Bounty Blueprint : A Beginner's Guide
PPTX
Crypto Night at CSUS - Bug Bounties
PDF
Fun & profit with bug bounties
PPTX
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
PDF
Ekoparty 2017 - The Bug Hunter's Methodology
PDF
DEFCON 23 - Jason Haddix - how do i shot web
Testers, get into security bug bounties!
Saying Hello to Bug Bounty
Basics of getting Into Bug Bounty Hunting
HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...
Getting_Started_with_Bug_Bounty program.
Bug bounties - cén scéal?
Nbt con december-2014-slides
Nbt con december-2014-slides
Recon and Bug Bounties - What a great love story!
Hacking WebApps for fun and profit : how to approach a target?
Web Application Security And Getting Into Bug Bounties
Bug bounty programs
Bug Bounty Hunter Methodology - Nullcon 2016
BugBounty Roadmap with Mohammed Adam
Bug Bounty Blueprint : A Beginner's Guide
Crypto Night at CSUS - Bug Bounties
Fun & profit with bug bounties
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
Ekoparty 2017 - The Bug Hunter's Methodology
DEFCON 23 - Jason Haddix - how do i shot web

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
Programs and apps: productivity, graphics, security and other tools
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology

How to do well in Bug bounty programs. Presentation at @nullhyd by Abhijeth