running a bug bounty program
play

Running a Bug Bounty Program What you need to know Shpend TU - - PowerPoint PPT Presentation

Running a Bug Bounty Program What you need to know Shpend TU - Master in Software Engineering Senior AppSec Engineer & Team Lead @ Bugcrowd Bug bounty Hunter Video Games Bsides Vienna 2016 Agenda What & Why


  1. Running a Bug Bounty Program What you need to know

  2. Shpend TU - Master in Software Engineering ● Senior AppSec Engineer & Team Lead @ Bugcrowd ● Bug bounty Hunter ● Video Games ● Bsides Vienna 2016

  3. Agenda ● What & Why ● Pre-launch ● Post-Launch ● Notable findings Bsides Vienna 2016

  4. Bug Bounty Programs

  5. Audience survey: Do you know what Bug Bounty means? Bsides Vienna 2016 Source (Hyperbole and a Half)

  6. The History of Bug Bounties: Abbreviated Timeline from 1995 to Present

  7. Why? Bsides Vienna 2016

  8. Should I invite random people to hack on my systems? Bsides Vienna 2016 Source (Hyperbole and a Half)

  9. Benefits to running a Bug Bounty Program Lots of Eyes ● Pay for results model ● Shows a more advanced security posture ● Better reputation ● Bsides Vienna 2016 Source (ESRB)

  10. Case Study: Instructure 2013 (Pentest) 2014 (Bug Bounty) 2015 (Bug Bounty) Critical 0 0 0 High 1 25 3 Medium 1 8 2 Low 2 16 5 https://www.canvaslms.com/security Bsides Vienna 2016 Source (Canvas)

  11. Who are these people? All ages ● All levels of experience & skillsets ● All over the world ● Users and and non-users ● Passionate about security! ● Bsides Vienna 2016 Source (ESRB)

  12. Researcher Incentive Cash! ● Reputation (Hall of Fame) ● Ranking (platforms) ● Passionate about security! ● Bsides Vienna 2016 Source (ESRB)

  13. The Value of Crowdsourced Testing Bsides Vienna 2016 Source (RedTeam Pentesting)

  14. How? Bsides Vienna 2016

  15. Before and After Pre-Launch as a Program Owner Post-Launch as a Program Owner ● ● Scope Handling Submissions (Manpower) ○ ○ Exclusions Communicating Effectively ○ ○ Environment Defining a Vulnerability Rating Taxonomy ○ ○ Access ○ Bsides Vienna 2016

  16. “Make a change, pay the researcher.” Bsides Vienna 2016 Source (Get A Life)

  17. Pre-Launch

  18. Scope Define target(s). ● Only webapp (www.example.com) ○ All subdomains (careful) (*.example.com) ○ All products & acquisitions (more careful) ○ Mobile? (Android, iOS, Windows Phone? j/k) ○ Human & physical ○ Bsides Vienna 2016 Source (Accurate Shooter)

  19. Scope Define non/rewardable findings ● No security impact (Logout csrf) ○ Best practice (Session management) ○ Full/partial poc? (XXE, SSRF,SQLI) ○ Define reward range ● Min and Max ○ Table based on vuln types ○ Define Disclosure ● Allowed or not ○ Bsides Vienna 2016 Source (Accurate Shooter)

  20. Exclusions You might not care about: ● (Low-impact) “low hanging fruit” ○ Intended functionality ○ Known issues (call out!) ○ Accepted risks ○ Issues based on pivoting ○ Bsides Vienna 2016 Source (Meme Generator)

  21. Environment Production vs. staging ● Make sure it can stand up to testing! ● Scanners ○ Contact forms ○ Pentesting requests ○ Special bounty types ● IoT/devices ○ Researcher environments ● Bsides Vienna 2016 Source (The Daily Mail)

  22. Access Easier = better (self-signup) ● Provide adequate resources for success ● E.g. sandbox credit cards ○ No shared credentials ● Bsides Vienna 2016 Source (Demotivation)

  23. Post-Launch

  24. Be Prepared ● High volume of submissions ● Scanners Manpower ● ● Communication Bsides Vienna 2016 Source (Meme Generator)

  25. Tips: Triage submissions ● Work oldest to newest ● Push back if unclear (ask more info) Tag valid findings ● ● Experience -> faster triage Bsides Vienna 2016 Source (Meme Generator)

  26. Tips: Triage submissions efficiently ● Check Domain/Bug for in scope ● Have multiple browsers ready ● Check for duplicates ● Keep burp open (you’ll need it) Reproduce (Replication steps) Have environment ready (XXE oob via ftp) ● ● ● Have accounts (with diff roles) ready ● Keep scope handy Bsides Vienna 2016 Source (Meme Generator)

  27. Communication is Key Researchers like: ● Concise, unambiguous responses ○ ESL ■ Short response time ○ Predictable reward time ○ Communicate issue being looked at ● Reply to researcher questions. ● Bsides Vienna 2016 Source (Profielwekstuk)

  28. Define a Vulnerability Rating Taxonomy For program owners: ● Speeds up triage process ○ Track your organization’s security posture ○ Arrive at a reward amount more quickly ○ For researchers: ● Focus on high-value bugs ○ Avoid wasting time on non-rewardable bugs ○ Alongside brief, helps build trust ○ Bsides Vienna 2016

  29. Discuss the VRT at a Roundtable Priority will change as your organization does ● Establish a regular meeting ● Review interesting bugs ○ Discuss additions ○ Propose changes ○ This is an ongoing process! ● Great learning opportunity ● Bsides Vienna 2016 Source (Wikipedia)

  30. Notable Findings

  31. Kernel Panic 2 Remote BoF kernel level (Cifs/NSF) ● Found in custom kernel modules ● Rewarded $10k each ● Timeframe: 2 weeks ● Bsides Vienna 2016 Source (Meme Generator)

  32. “You can’t see me” exposed! POS tablet (Android) ● Shipped to researchers for testing ● Winner takes all ($15k) ● Hacked via flashing ● Bonus bug: admin backdoor ● Bsides Vienna 2016 Source (Meme Generator)

  33. Login as anyone SSO available for setup ● Domain no verified ● Attacker set ups SSO ● Attacker adds ANY email address in their ● SSO account Attacker available to login using that email ● address Reward: $10k ● Bsides Vienna 2016 Source (Meme Generator)

  34. Thanks! Shpend Kurtishaj me@shpendk.com @shpendk Source (xkcd)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend