36
#securitymeetup “When big brick wall becomes wooden fence” or “how to get 1kk on the Bug Bounty”

Lets talk about bug hunting

Embed Size (px)

Citation preview

Page 1: Lets talk about bug hunting

#securitymeetup

“When big brick wall becomes wooden fence” or “how to get 1kk on

the Bug Bounty”

Page 2: Lets talk about bug hunting

#:whoami?

• Known as ‘isox’• Web penetration tester• QIWI CISO• Member of “hall-of-fames” (Yandex, Mail.ru,

Apple, and so on)• JBFC participant ^___^

Page 3: Lets talk about bug hunting

Hungry nomads

• Disparate groups• Attacking every tower they see• Using equal techniques and weapons• Really meticulous• Clever and creative• You and I

Page 4: Lets talk about bug hunting

Castle with gold

• Ready to pay tribute for every successful attack

• Got enermous territory surrounding it• Provides protection for their citizen• Takes care about it’s borders• Makes friendship with neighbors

Page 5: Lets talk about bug hunting

Looking at the frontend

• Huge strong (fire)walls• Musketeers and howitzers• Moat with crocodiles• Perfect gate citizenship control• Flawless architecture

… gentlemans, what we are waiting for?

Page 6: Lets talk about bug hunting

Common assault

• 10 days for one embossed brick• Taked notice that walls are really pregnable• 100 gold coins of income• Got tired and went home

Page 7: Lets talk about bug hunting

I worked using Burp Suite with plugins for a week.

Page 8: Lets talk about bug hunting
Page 9: Lets talk about bug hunting

Why so bad?

• Most of us took weapons from the same blacksmith

• Studied martial arts in one academy• There is very little of “unique attack

techniques”• Unless you are black (magic) fan or can make a

dozen of «PP» tricks• All easy ways are already found

Page 10: Lets talk about bug hunting

Just stats for one day and one vector

Page 11: Lets talk about bug hunting

Let’s dot the i’s and cross the t’s

• We are not making “security research”• We are working for our own• We came here to hack em for money• We are legal whitehats

Page 12: Lets talk about bug hunting

Bad advice №1

Page 13: Lets talk about bug hunting

Illusion of good network aggregation

• It does not really matter where this RCE or SQLi will be

• Common case: injection in aux DB leads to main DB takeover thru datalink

• Do you really believe writing “don’t hack this domains” will stop anybody?

• Hack everything you can find in target AS

Page 14: Lets talk about bug hunting

Sometimes like this

Page 15: Lets talk about bug hunting

Or like that

Page 16: Lets talk about bug hunting

Or even like “I just hacked this IP”

Page 17: Lets talk about bug hunting

Bad advice №2

Page 18: Lets talk about bug hunting

Rabbit’s are not only puff

• 50$ is 50$• “I’m too cool for clickjacking, self-xss, bad

crossdomain.xml, POODLE, bad CSP”…forget about it

• If it is security issue – report it• Availability of bruteforce is also security bug• Missing captcha too• Information disclosure absolutely

Page 19: Lets talk about bug hunting

Sometimes $140

Page 20: Lets talk about bug hunting

10 clickjacks == 1 XSS

Page 21: Lets talk about bug hunting

Bad advice №3

Page 22: Lets talk about bug hunting

Enterprise toys are expensive

• Nessus SC for enterprise costs a lot as example• Sometimes security team just can’t configure

it well• Or does not use it at all• Scan it, validate it, report it!

Page 23: Lets talk about bug hunting

For very nice bugs like this

Quagga is a routing software suite, providing implementations of OSPFv2, OSPFv3, RIP v1 and v2, RIPng and BGP-4 for Unix platforms, particularly FreeBSD, Linux, Solaris and NetBSD.

Page 24: Lets talk about bug hunting

Good advice №1

Page 25: Lets talk about bug hunting

First2discover is first2pwn

• Find your target AS-es (radar.qrator.net as example)

• Find domains and regions (subbrute + google)

• Automate nmap for portscanning target AS

• Keep your eyes at the difference report

• Be the first bounty hunter to discover new service

Page 26: Lets talk about bug hunting

Dev, test, debug…yummy!

Page 27: Lets talk about bug hunting

Good advice №2

Page 28: Lets talk about bug hunting

We are lazy

• RegEx for sanitizing “abG$2.###” is too lazy to write

• Huge frameworks and API’s are awesome• Just MD5 username and salt with IP, this will

be sessionid• Keep in mind that developers are humans too• Just imagine yourself at their place

Page 29: Lets talk about bug hunting

Yandex.Disk case

• What we know: Our yandex id, 229857356• What we see in requests:

_model.0=tree&id.0=/disk• What we will try:

_model.0=tree&id.0=229857356:/disk• Profit. Access any disk by full URI just changing

it’s uid.

Page 30: Lets talk about bug hunting

Good advice №3

Page 31: Lets talk about bug hunting

Automate your ideas

• Don’t be lazy, write your own plugins• Automate every cool vector you can create• Automate even every good vector you can

find!• Your fuzzing and attacks must be uniq

Page 32: Lets talk about bug hunting

Let’s try to find errors in a good way

Page 33: Lets talk about bug hunting

Don’t take it all too serious

• Research new vulnerabilities• Don’t stop working hands on. Repeater is your

best friend.• Keep learning! It’s so much interesting you

don’t know!• Share information with bro’s• Money is nothing. Seriously.

Page 34: Lets talk about bug hunting

Thanks :)

• @videns, u r a dick• @d0znpp for good parties• QIWI security team for a presented time to

write this slides• Mail.Ru for this great evening

Email party invitations at [email protected]

Page 35: Lets talk about bug hunting

QIWI IS HIRING

• Security Expert in Application Security Team– Write to [email protected]

• Security Expert in Infrastructure Security Team– Write to [email protected]

• Python programmer in Internal Development– Write to [email protected]

• Welcome

Page 36: Lets talk about bug hunting