+
BUG BOUNTY - ONE YEAR LATER
2
ABOUT US
Alejandro Iacobelli
Application Security Manager at MELI and
OWASP Buenos Aires Chapter Leader
Appsec Profesor
alejandro.iacobelli@owasp.org
linkedin.com/in/aiacobellisec
twitter: @aiacobelli_sec
Pablo Garbossa
Information Security Manager at MELI and
OWASP Buenos Aires Chapter Leader
pablo.garbossa@owasp.org
ar.linkedin.com/in/pgarbossa
twitter: @pgarbossa
3
DISCLOSURE
Las opiniones expresadas en la presentación y/o en los slides
siguientes son solamente nuestras y no necesariamente de
nuestro empleador.
4
We will
talk about...
■ What is a bug bounty program?
■ Why it is important?
■ Company’s perspective
5
Crowdsourced
Security
+
6
2016
2017
2018
2020
2019
THE BEGINNINGS
Pre-work
Identify
Learning
Growth
7
HALL OF FAME
8
LESSONS
LEARNED
failing
to
prepare
prepare
to
fail
=
9
LESSONS LEARNED
Make your
pre-work
Not a
Silver Bullet
Defense
in Depth Scope
Show me
the MONEY
Quality and
Quantity
Response
Time
Community
10
PRE-WORK
SLA
11
PRE-WORK
SLA
BACKLOG
12
PRE-WORK
SLA
BACKLOG
SECURITY TEAM CAPACITY
13
PRE-WORK
SLA
BACKLOG
SECURITY TEAM CAPACITY
KNOW YOURSELF
14
PRE-WORK
SLA
BACKLOG
SECURITY TEAM CAPACITY
KNOW YOURSELF
CHOOSE PARTNER
15
PRE-WORK
SLA
BACKLOG
SECURITY TEAM CAPACITY
KNOW YOURSELF
CHOOSE PARTNER
MAKE A POLICY
16
NOT A SILVER BULLET
Security Requirements
Engineering
Threat modeling
Attack surface analysis
Misuse case analysis
SasT
Software Composition Analysis
Secure coding standards
DasT
Vulnerability Assessment
Peer Code Review
Security Culture
Software acceptance
Bug Bounty Program
Penetration testing
Vulnerability Assessments
Vulnerability
Management
Monitoring
Anomaly detection
Configuration
Management
Avoid Penetrate and Patch Model
17
NOT A SILVER BULLET
Do not only use it as vulnerability detector
Tactic / Reactive Strategic / Proactive
Appsec program
MATURITY
● Celebrate findings
● Set objectives in order
to increase findings
● Generic Policy
● Every finding is seen as a fail
on some stage of the SDLC
● Root cause analysis per
finding
● Analice bounty information
to set new OKR’s
18
DEFENSE IN DEPTH
Bug Bounty is not a replacement for pentesting
Vulnerability
Assessment
Penetration
Testing
19
RESPONSE TIME
Measure times and analyze effect on researchers
First Response Time
Average time to triage
Average time to bounty
Average time to resolution
Managed programs
20
TIME TO BOUNTY
Bounty time matters
Cum hoc ergo propter hoc!!
21
RESPONSE TIME
Pay for risk reduction (> Mature) -> Resolution time and
internal SLA are important -> If not, angry community
Pay on valid report (< Mature) -> Careful with Dupi! ->
Angry community
Define your strategy: Pay for fix or pay for valid
report
22
BUDGET
More money more interest
Pay a lot for trivial findings & Up
SHOW ME
THE MONEY
MATURITY
Money should go up according to maturity
¿How to choose how much to pay?
23
SCOPE
Prudence to the unknown is good but too much prudence is not
● Makes recon and
learning curve
more complicated
● Products do not
depend of a single
domain
● Accepting 3 times
of vulnerabilities
makes first report
barrier very
difficult
24
SCOPE
Prudence to the unknown is good but too much prudence is not
Cum hoc ergo propter hoc!!
25
QUALITY OVER QUANTITY
More knowledge, better vulnerabilities
- More accurate documentation (Cards,Users,api’s)
- Announce new features
- Challenge researchers into specific targets
- Organize events to bond with the community
26
COMMUNITY
Gamification
27
Conclusions
- Before anything else, preparation is the key to success (make your pre-work)
- Un programa maduro de seguridad aplicativa no puede depender únicamente de este tipo de
iniciativas para detectar fallas en sus aplicaciones - (Not a silver bullet)
- Un programa de bug bounty no es un reemplazo a los ejercicios de pentest tradicionales, sino un
complemento” (Defense in depth)
- “Un hunter desmotivado genera un efecto avalancha en la comunidad y los tiempos de respuesta son
un factor influyente” (Response Time)
- “Del total de invitaciones rechazadas, el 20% son debidas a scope acotado ” (Scope)
- “Los montos a pagar deben tener relación a la madurez de los productos a testear, el presupuesto
disponible y lo riesgoso que puede ser ese producto para la empresa.”(Show me the money)
- “Por lo general, las vulnerabilidades de mayor impacto se detectan una vez que se logra entender las
funcionalidades de una aplicación a fondo.”(Quality and Quantity)
- Focus on making community.
28
Q&A

More Related Content

PPTX
7 Bug Bounty Myths, BUSTED
PPTX
Bug bounty hunting
PDF
CrikeyCon 2017 - Rumours of our Demise Have Been Greatly Exaggerated
PDF
BSides LA/PDX
PDF
Yet another talk on bug bounty
PDF
Crowdsourced Vulnerability Testing
PDF
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
PDF
Owasp LA
7 Bug Bounty Myths, BUSTED
Bug bounty hunting
CrikeyCon 2017 - Rumours of our Demise Have Been Greatly Exaggerated
BSides LA/PDX
Yet another talk on bug bounty
Crowdsourced Vulnerability Testing
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
Owasp LA

Similar to OWASP LATAM@home 2020 (20)

PPTX
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
PDF
Bug Bounty Hunter's Manifesto V1.0
PPTX
AusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
PDF
Testers, get into security bug bounties!
PDF
Introducing Bugcrowd
PPTX
Nbt con december-2014-slides
PPTX
Nbt con december-2014-slides
PPTX
Web security – everything we know is wrong cloud version
PDF
Omar Benbouazza | Bugbounty Programs | Codemotion Madrid 2018
PDF
The Most Important Thing: How Mozilla Does Security and What You Can Steal
PDF
[Webinar] The Art & Value of Bug Bounty Programs
PPTX
LKNOG3 - Bug Bounty
PPTX
Web Application Security And Getting Into Bug Bounties
PPTX
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
PDF
Bug Bounty Guide Tools and Resource.pdf
PPTX
Bug bounties - cén scéal?
PDF
APIdays Helsinki 2019 - API Security Risk Management with Bug Bounties with L...
PDF
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
DOCX
Earn Money from bug bounty
PPTX
Getting_Started_with_Bug_Bounty program.
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
Bug Bounty Hunter's Manifesto V1.0
AusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
Testers, get into security bug bounties!
Introducing Bugcrowd
Nbt con december-2014-slides
Nbt con december-2014-slides
Web security – everything we know is wrong cloud version
Omar Benbouazza | Bugbounty Programs | Codemotion Madrid 2018
The Most Important Thing: How Mozilla Does Security and What You Can Steal
[Webinar] The Art & Value of Bug Bounty Programs
LKNOG3 - Bug Bounty
Web Application Security And Getting Into Bug Bounties
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bug Bounty Guide Tools and Resource.pdf
Bug bounties - cén scéal?
APIdays Helsinki 2019 - API Security Risk Management with Bug Bounties with L...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Earn Money from bug bounty
Getting_Started_with_Bug_Bounty program.
Ad

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Configure Apache Mutual Authentication
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
STKI Israel Market Study 2025 version august
PPT
What is a Computer? Input Devices /output devices
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Five Habits of High-Impact Board Members
PDF
Architecture types and enterprise applications.pdf
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
Getting started with AI Agents and Multi-Agent Systems
Configure Apache Mutual Authentication
Developing a website for English-speaking practice to English as a foreign la...
Enhancing plagiarism detection using data pre-processing and machine learning...
STKI Israel Market Study 2025 version august
What is a Computer? Input Devices /output devices
NewMind AI Weekly Chronicles – August ’25 Week III
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
A review of recent deep learning applications in wood surface defect identifi...
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Five Habits of High-Impact Board Members
Architecture types and enterprise applications.pdf
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Benefits of Physical activity for teenagers.pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Zenith AI: Advanced Artificial Intelligence
Ad

OWASP LATAM@home 2020

  • 1. + BUG BOUNTY - ONE YEAR LATER
  • 2. 2 ABOUT US Alejandro Iacobelli Application Security Manager at MELI and OWASP Buenos Aires Chapter Leader Appsec Profesor alejandro.iacobelli@owasp.org linkedin.com/in/aiacobellisec twitter: @aiacobelli_sec Pablo Garbossa Information Security Manager at MELI and OWASP Buenos Aires Chapter Leader pablo.garbossa@owasp.org ar.linkedin.com/in/pgarbossa twitter: @pgarbossa
  • 3. 3 DISCLOSURE Las opiniones expresadas en la presentación y/o en los slides siguientes son solamente nuestras y no necesariamente de nuestro empleador.
  • 4. 4 We will talk about... ■ What is a bug bounty program? ■ Why it is important? ■ Company’s perspective
  • 9. 9 LESSONS LEARNED Make your pre-work Not a Silver Bullet Defense in Depth Scope Show me the MONEY Quality and Quantity Response Time Community
  • 15. 15 PRE-WORK SLA BACKLOG SECURITY TEAM CAPACITY KNOW YOURSELF CHOOSE PARTNER MAKE A POLICY
  • 16. 16 NOT A SILVER BULLET Security Requirements Engineering Threat modeling Attack surface analysis Misuse case analysis SasT Software Composition Analysis Secure coding standards DasT Vulnerability Assessment Peer Code Review Security Culture Software acceptance Bug Bounty Program Penetration testing Vulnerability Assessments Vulnerability Management Monitoring Anomaly detection Configuration Management Avoid Penetrate and Patch Model
  • 17. 17 NOT A SILVER BULLET Do not only use it as vulnerability detector Tactic / Reactive Strategic / Proactive Appsec program MATURITY ● Celebrate findings ● Set objectives in order to increase findings ● Generic Policy ● Every finding is seen as a fail on some stage of the SDLC ● Root cause analysis per finding ● Analice bounty information to set new OKR’s
  • 18. 18 DEFENSE IN DEPTH Bug Bounty is not a replacement for pentesting Vulnerability Assessment Penetration Testing
  • 19. 19 RESPONSE TIME Measure times and analyze effect on researchers First Response Time Average time to triage Average time to bounty Average time to resolution Managed programs
  • 20. 20 TIME TO BOUNTY Bounty time matters Cum hoc ergo propter hoc!!
  • 21. 21 RESPONSE TIME Pay for risk reduction (> Mature) -> Resolution time and internal SLA are important -> If not, angry community Pay on valid report (< Mature) -> Careful with Dupi! -> Angry community Define your strategy: Pay for fix or pay for valid report
  • 22. 22 BUDGET More money more interest Pay a lot for trivial findings & Up SHOW ME THE MONEY MATURITY Money should go up according to maturity ¿How to choose how much to pay?
  • 23. 23 SCOPE Prudence to the unknown is good but too much prudence is not ● Makes recon and learning curve more complicated ● Products do not depend of a single domain ● Accepting 3 times of vulnerabilities makes first report barrier very difficult
  • 24. 24 SCOPE Prudence to the unknown is good but too much prudence is not Cum hoc ergo propter hoc!!
  • 25. 25 QUALITY OVER QUANTITY More knowledge, better vulnerabilities - More accurate documentation (Cards,Users,api’s) - Announce new features - Challenge researchers into specific targets - Organize events to bond with the community
  • 27. 27 Conclusions - Before anything else, preparation is the key to success (make your pre-work) - Un programa maduro de seguridad aplicativa no puede depender únicamente de este tipo de iniciativas para detectar fallas en sus aplicaciones - (Not a silver bullet) - Un programa de bug bounty no es un reemplazo a los ejercicios de pentest tradicionales, sino un complemento” (Defense in depth) - “Un hunter desmotivado genera un efecto avalancha en la comunidad y los tiempos de respuesta son un factor influyente” (Response Time) - “Del total de invitaciones rechazadas, el 20% son debidas a scope acotado ” (Scope) - “Los montos a pagar deben tener relación a la madurez de los productos a testear, el presupuesto disponible y lo riesgoso que puede ser ese producto para la empresa.”(Show me the money) - “Por lo general, las vulnerabilidades de mayor impacto se detectan una vez que se logra entender las funcionalidades de una aplicación a fondo.”(Quality and Quantity) - Focus on making community.