- Navigating Security
- Posts
- 100 Bug Bounty Tips đŻ
100 Bug Bounty Tips đŻ
Invaluable tips...
Yoo. Welcome to Issue #05 of Navigating Security.
đQuote of the week:
Hackers are like artists, philosophers, and engineers all rolled into one. They challenge assumptions, seek flaws in systems, and reshape the world around them in unexpected ways
TLDWTR đ
More CVE hunting tips in case you missed them last time âł
An aspiring hackerâs web application penetration testing guide for 2024 by HTBâs 2023 MVP đ
100 Bug Bounty Tips by @ArchAngelDDay đŻ
âąď¸ Incase you missed the previous issue, here you go:
This Weekâs YouTube Video:
More CVE Hunting
An aspiring hackerâs web application pentesting guide đ¸ď¸
Hacktheboxâs 2023 MVP wrote a rather lengthy guide on how to get into web application hacking in the year 2024. If you are just starting, this is a good read. He doesnât spend the entire time promoting HTB, but gives some valuable advice. Here are some of the key takeaways:
Master web technologies: HTML, CSS, JavaScript, and server-side languages (e.g., PHP, Python).
Use specific tools: Burp Suite (web proxy), OWASP ZAP (vulnerability scanner), and Metasploit (penetration testing framework).
Practice on platforms like Hack The Box to gain real-world pentesting experience.
Understand both internal (within an organization) and external (from outside the organization) testing approaches.
Engage in the testing process, starting from contract and scope definition to reporting vulnerabilities.
100 Bug Bounty Tips đŻ
You saw the title, I know youâre here for the tips so I wonât keep you waiting any longer. These are from Douglas Dayâs X (formerly known as Twitter) so be sure to check out the original tweet linked at the end. Enjoy đ
Spend at least 30 minutes on a new target
Look for âNoâs
Use Italics Tags in your inputs instead of XSS payloads
Focus on SaaS apps that are multi-tenant
Buy Burp Pro
On a new target go straight to the User Management section
See if inviting an existing user to your org exposes their name
See if inviting an existing user removes them from their own org
If the scope has a wildcard, use sub finder to find subdomains
Run HTTPX on the list of subdomains to narrow down alive targets
On an app youâre not familiar with, use it like a normal user first
If the docs say you canât do X, but you can do X then you have a bug
Use match & replace rules to find new endpoints
Budget time into your week specifically for hacking
Give yourself a no-bug time limit. I do 3 hours.
Go back to old dupes and see if you can still reproduce.
Look for â+2â in your reputation log to find dupes that should be now.
Make your report a conversation, not a sales pitch
Accept & expect that dupes will happen
File & Forget
If an endpoint has âapi/v2/â, try âapi/v1/â
If an endpoint has âapi/v2â, try removing the âv2â altogether
6 $1000 Mediums pay more than 1 $5,000 crit. Donât ignore any bugs
Lows are still bugs that should be filed
Be kind to your triager
Say âthank youâ when you get a bounty
If an app uses UUIDs, you can still look for IDORs. Just set âAC:Hâ.
If UUID IDORs exist, then look for an endpoint that exposes UUIDs
Pin your success on whether you followed your plan, not if you found bugs
A program that has a lot of hackers doesnât mean there isnât low-hanging fruit
Going deep will pay off
Working with new hackers will pay off in dividends
Donât be jealous
Bug Bounty income isnât consistent. Be okay with peaks & valleys for your sanity
If you find a bug thatâs OOS, still ask the customer if they care
Thereâs no end. Enjoy the journey
Have a hobby thatâs not related to hacking
Have friends that donât hack
Figure out what time of day you hack the best. Late nights arenât for me.
Spend that extra 2 minutes to make your report look/read nice
âSubscribeâ to programs that pay well and have good scope
Donât whine on Twitter about a single report. Or at all for that matter.
IDORs and Privilege Escalations are a great place to start
Unmet expectations lead to disappointment
Teach someone else how to hack
Time spent reading/learning is time well spent
Focus on programs that you actually use in your day-to-day
Establish a relationship with the program
Try asking the program what types of bugs they want to see
Look at a program leaderboard to see who you should collab with
When collaborating, an even bounty split eliminates the hassle
Take a break when you stop having fun
At an LHE, start hacking ahead of time
Look for programs that are active in resolving reports
Look for programs that havenât awarded a lot recently
Look for programs that have collaboration enabled
Look for programs that donât list out a bunch of known issues
Look for programs that have a history of adding new scope
Change your strategy if youâve gone a while without a finding
If youâre on a roll, keep doing what youâre doing
But donât let success keep you from evolving/growing
Compare yourself against yourself from last year
Maintain online presence for new opportunities
Be thankful for failure
Read disclosed reports
Focus on one program at a time. Cycle if you get bored.
Donât spray XSS payloads everywhere
If possible, work at a company that has a BBP
Spend bounty money on tools that will generate more bounties
Budget a specific amount of your bounties for fun. And stick to it.
When hacking a store, donât be afraid to make small purchases
Look for changes in JS files to know when there may be new functionality
Look for references to subdomains in a companyâs GH repo
Look for references to subdomains in employeeâs GH repos
If the app uses Intercom, try booting it with another email
Look for second-degree IDORs
SSRFs exist when the app makes any external request. Look for these requests.
Look for actuator endpoints
Find hackers that hack differently than you.
Try hacking in a different room of the house
Try hacking at a different location altogether
If you find the same bug on different endpoints, file it as a different bugs
Try always having some pending bugs in your pipeline
Break your yearly bounty goal into monthly goals
Know when a bounty isnât worth fighting over
Push back gently when a report gets downgraded
Use the leaderboard as motivation, not as comparison
Donât reinvent the wheel when a tool exists
Donât be afraid to build the wheel if the tool doesnât
Try collabing in real time over video chat
Always ask why something works the way it does
When collabing, donât be afraid to be the underperformer
When collabing, donât get salty about being the overperformer
Use mediation, but use it sparingly
Be generous with your earnings
Hack for fun, not for a paycheck
LHEs are a privilege, not an expectation
Programs are your friend, not your adversary. Work with them
The platform is your friend, not your adversary. Work with them
Suggestions
Hit me up on Discord or LinkedIn if you have anything you feel would be cool to include. Thanks, Cheers.