Conference notes: Automation for Bug Hunters (Bug Bounty Talks)
Posted in Conference notes on July 25, 2018
Posted in Conference notes on July 19, 2018
Hi, these are the notes I took while watching the “How to fail at bug bounty hunting” talk given by Caleb Kinney on LevelUp 2017.
P1 | Critical | privilege escalation, sensitive data exfiltration, Remote Code Execution |
P2 | Severe | vulns that affect the security of the platform |
P3 | Moderate | vulns that affect multiple users and require little or no user interaction |
P4 | Low | vulns that affect single users and require user interaction |
P5 | Informational (Won’t fix) | no exploitable vulnerabilities and usually will not be fixed by the program |
- **Explain why** the BBP should take action and **remediate** the bug
- **Explain if** the bug requires victim **interaction**
- If it does, are you able to bypass any security controls?
- Explain if the bug **affect single or multiple users**
- Can you **chain multiple bugs** to **increase their impact**? (Impact is linked to bug rewards and points)
If you have any questions or suggestions, please leave a comment at the bottom of this page, a tweet or a message via our [contact page]({{ site.url }}{{ site.baseurl }}/contact.html). See you next time!