Open Administration Interface owned by Scompany (Ansible Tower) ($500)
13
Trying To Be Cheeky
14
Low Risk Bugs
15
N/A Bugs
16
Full Time vs Part Time
17
Focus on Techniques
18
Multiple Steps To Victory
19
Second Order Takeovers
20
Expanding The Scope
21
Targeting Country Specific Assets
22
Dirty box...
23
Testing Scripts
24
Debug Endpoints
25
Transport.Co Dox'd
26
Third Party Platforms
27
Dangling IP Subdomain Takeover
28
Defining Recon
29
Performing Recon
30
IDORS: A Systemic Problem
31
Automation
32
Retrospective
33
Further Reading
Description:
Explore the world of bug bounty hunting in this 46-minute talk by an experienced hacker. Gain insights into the evolution of skills, reporting techniques, and payouts over five years of submitting vulnerabilities to companies across various industries. Discover step-by-step explanations of favorite bug discoveries, debunk the myth of a secret formula for success, and learn valuable lessons for replicating achievements in bug bounty programs. Delve into topics such as writing high-quality reports, focusing on effective techniques, and leveraging multiple steps to achieve victories. Understand the importance of expanding scope, targeting country-specific assets, and utilizing debug endpoints. Gain knowledge about third-party platforms, dangling IP subdomain takeovers, and the systemic problem of Insecure Direct Object References (IDORs). Learn about the significance of reconnaissance and automation in bug hunting. Whether you're a beginner or an experienced hacker, this presentation offers valuable insights to enhance your bug bounty hunting skills and success rate.
Read more