Bug bounty vs. Big companies.pdf - Google Drive

14 downloads 226 Views 4MB Size Report
Big companies.pdf. Bug bounty vs. Big companies.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Bug bounty
Bug bounty vs. Big companies Paul Amar, Hack.lu, 19/10/2017

Le Puy de Dôme, Auvergne.

Puy de Dome, Auvergne.

Charming attraction in the City of London - Tube during strike + rush hour combo, lovely.

“If attackers get to choose what time we're going to engage with them, we get to choose the battlefield.” Haroon Meer, “Learning the wrong lessons from Offense”, 2016

La bataille de Marengo, 14th of June 1800 - http://desaix.unblog.fr/

“If the cost to attack is less than the value of your information to the attacker, you will be attacked.” Dino A. Dai Zovi, “Attackers Math 101”

“Build your defenses from an offensive mindset.” Zane Lackey, “Attack-driven defense”, 2013

-

Found http://bf1-adxdb-001.data.bf1.yahoo.com

https://medium.com/bugbountywriteup/900-xss-in-yahoo-recon-wins-65ee6d4bfcbd

-

Found http://bf1-adxdb-001.data.bf1.yahoo.com Enumerated files and found: - about.php - nginx.conf - testdb.php < vulnerable to XSS - 900 USD$ bounty

https://medium.com/bugbountywriteup/900-xss-in-yahoo-recon-wins-65ee6d4bfcbd

-

Found http://bf1-adxdb-001.data.bf1.yahoo.com Enumerated files and found: - about.php - nginx.conf - testdb.php < vulnerable to XSS - 900 USD$ bounty

Enumeration also led him to (5 subdomains deep): -

target.*.*.*.yahoo.com target.*.*.*.*.yahoo.com

https://medium.com/bugbountywriteup/900-xss-in-yahoo-recon-wins-65ee6d4bfcbd

IP Ranges & Exposure

So what? Monitor your ranges and *automatically* check: - New IP addresses? -

What’s open on it?

So what? Monitor your ranges and *automatically* check: - New IP addresses? -

What’s open on it?

- Any delta? -

Open/Closed ports, changed services? (Apache > Nginx, …)

So what? Monitor your ranges and *automatically* check: - New IP addresses? -

What’s open on it?

- Any delta? -

Open/Closed ports, changed services? (Apache > Nginx, …)

- Go for low-hanging fruits -

“product: tomcat”, port:445, port:3389, port:21 “successfuly logged in”, …

So what? Monitor your ranges and *automatically* check: - New IP addresses? -

What’s open on it?

- Any delta? -

Open/Closed ports, changed services? (Apache > Nginx, …)

- Go for low-hanging fruits -

“product: tomcat”, port:445, port:3389, port:21 “successfuly logged in”, …

- Always ask you the question: -

Should it be exposed online?

Domains names

What’s out there? -

theHarvester (https://github.com/laramies/theHarvester) Knockpy (https://github.com/guelfoweb/knock) Enumall (https://github.com/jhaddix/domain) GoBuster (https://github.com/OJ/gobuster) dnsrecon (https://github.com/darkoperator/dnsrecon) subbrute (https://github.com/TheRook/subbrute) Aquatone (https://github.com/michenriksen/aquatone)

Domain wordlist? @jhaddix got you covered: https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056

https://media.rootcon.org/ROOTCON%2011/Trainings/RECON.pdf

https://www.blackhillsinfosec.com/eyewitness-and-why-it-rocks/

https://www.blackhillsinfosec.com/eyewitness-and-why-it-rocks/ https://github.com/ChrisTruncer/EyeWitness

https://hub.docker.com/r/wappalyzer/cli/

https://github.com/evilsocket/xray

SSL certificates

https://mishresec.wordpress.com/2 017/10/13/uber-bug-bounty-gainin g-access-to-an-internal-chat-syste m/

(Unofficial) Python API: https://github.com/PaulSec/crt.sh

(Unofficial) Python wrapper : https://github.com/PaulSec/censysio

http://nahamsec.com/secure-your-jenkins-instance-or-hackers-will-force-you-to/

Sensitive source code

What to look for? Use their search engine and start looking for g00di3s: "company" API_key "company" secret_key "company" aws_key "company" Password "company" FTP "company" Login "company" Github_token

https://www.hackerone.com/blog/how-to-recon-and-content-discovery

Remember this?

Remember this?

Remember this?

Automated tools within CI

https://bugbountyforum.com/tools/

Amazon Web Services (S3)

https://flaws.cloud

https://gist.github.com/PaulSec/50c5075017e3021d46d4560793353f1d

Wrapping-up

Few takeovers - Pepito ¡Arriba, arriba! -

https://github.com/PaulSec/pepito

- Wrapper for Censys.io -

https://github.com/PaulSec/censysio

- AWS scan script to test AWS S3 bucket configuration/security -

https://gist.github.com/PaulSec/50c5075017e3021d46d4560793353f1d

- Python script to gather scopes and public reports from HackerOne (in csv) -

https://gist.github.com/PaulSec/fd29abf7d596ccc58439e21376d3eabf

- eyeWitness - Perform footprint of web servers, RDP, VNC, ... -

https://github.com/ChrisTruncer/EyeWitness

- Wappalyzer docker container -

https://hub.docker.com/r/wappalyzer/cli/

How to keep up? - @jhaddix and @nahamsec are really good resources -

Also many hunters but I will not try to name them all here…

- @disclosedh1 for public reports on HackerOne - /r/netsec/ -

Public blog post get usually posted there. Lurk and wait for MOAR.

- Develop stuff.

Embrace hackiness. (and thanks for not sleeping)

Paul Amar

@PaulWebSec

Resources - “Learning the wrong lessons from Offense”, Haroon Meer https://www.youtube.com/watch?v=AQfbPpkaq88 - Zane Lackey - Attack-driven defense https://www.youtube.com/watch?v=_4vSurKPl6I - Recon slides from jhaddix https://media.rootcon.org/ROOTCON%2011/Trainings/RECON.pdf - How to recon? https://www.hackerone.com/blog/how-to-recon-and-content-discovery