Hi, these are the notes I took while watching the talk “How to Differentiate Yourself as a Bug Bounty Hunter” given by Mathias Karlsson at OWASP Stockholm.
What Mathias does before he starts working on a program
It’s the enumeration of all assets & functionalities included in scope
Assets can include subdomains, stuff from open source intelligence, virtual hosts, web services, specific paths, the developers’ Github accounts (=> information on how the backend works)
Why?
More known assets = More code to test = Increase bugs found
Things enumerated that are harder to find = Decrease risk of duplicate
Things harder to use/understand = Decrease risk of duplicate
Most bug hunters discard them because they are intimidating
Examples:
Learn new technologies like Graphql
Get & test the pro version (paid)
Automation = Decrease time spent
Automate everything you can
It doesn’t have to be good, as long as you understand how it works
Can be a Bash script that calls a bunch of Perl or Python scripts
You don’t want to do anything in your recon process manually more than once
So you can start doing research on a subject in the few hours you have here and there until you find one of these bugs, then look for it on bug bounty programs
Note: I’m paraphrasing here, not reporting exact quotes…
Q: Have you ever hit backlists when monitoring targets & got yourself blocked out because you were monitoring too hard or too often?
A: My monitoring is very gentle. It happens but not often. I don’t run tools like Nessus. I only send a few HTTP requests per day. They’re spread out over time
Q: [not clear, I understood something like: can you still hack a target even if they’re using a WAF?]
A: WAFs are really good at blocking automated attacks but not manual ones. If I detect a WAF, I either give up because it’s a waste of time or figure out a way around it. Many times, it’s possible
Q: Do you do recon against the employees of your target? For example, trying to figure out what their programming style is based on what they published on public personal accounts
A: yes, that’s what a real attacker would do
Q: Did you ever go out of scope & make someone upset?
A: It’s happens but accidently. Programs are pretty understanding, I never got into real trouble