📓
Sfoffo - Pentesting Notes
View on GitHub
  • 🏠/home/sfoffo/.pt-notes
  • 🏳️Contributions
    • 2024 Contributions
      • CVE-2024-42845
      • CVE-2024-41819
      • CVE-2024-41943
      • CVE-2024-50344
  • 🍀Support this Project
  • 📂Active Directory
    • Initial Access
    • Internal Enumeration & Lateral Movement
    • Privilege Escalation to Domain Admin using Known Exploits
    • Domain Trusts
  • 🐧Linux Privilege Escalation
    • Enumerating Attack Vectors
    • Privileged Groups
    • Environment Variables Abuse
    • Capabilities Abuse
    • Programs, Jobs and Services
    • Miscellaneous Techniques
    • Recent CVEs
  • 🪟Windows Privilege Escalation
    • Enumerating Attack Vectors
    • Excessive User Rights Abuse
    • Built-in Groups Abuse
    • File System ACLs
    • Services Hijacking
    • User Account Control (UAC) Bypass
    • Living off the Land
  • 🐛Bug Bounty Hunting
    • Bug Bounty Tools
  • 🕸️Web Applications
    • Web Attacks
      • Cross Site Scripting (XSS)
      • SQL Injection (SQLi)
      • File Upload Vulnerabilities
      • Insecure Direct Object References (IDOR)
      • OS Command Injection
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
      • XML External Entities (XXE)
      • HTTP Verb Tampering
    • Web Technologies
      • Tomcat
      • CGI Applications
      • WordPress
      • WebDav
      • Microsoft IIS
      • SAP Netweaver
      • Joomla
      • Drupal
      • Gitlab
      • Jenkins
      • osTicket
      • PRTG Network Monitor
      • Splunk
    • Fuzzing
  • 🔍Information Gathering
  • 📜Protocols and Services
    • DNS
    • FTP
    • IMAP
    • IPMI
    • MSSQL
    • MySQL
    • NFS
    • Oracle TNS
    • POP3
    • RDP
    • SMB
    • SMTP
    • SNMP
  • 👾Utilities, Scripts and Payloads
    • Shells and Payloads
    • Metasploit Framework
    • File Transfers
    • Pivoting, Tunneling, Port Forwarding
    • Password Attacks
Powered by GitBook
On this page
  • Overview - Bug Bounty Programs
  • Reporting your Findings
  • Triaging Phase

Was this helpful?

Edit on GitHub

Bug Bounty Hunting

Overview - Bug Bounty Programs

Generally speaking, a bug bounty program is a proactive security testing initiative that allows individuals to receive recognition and compensation for discovering and reporting vulnerabilities.

Bug Bounty Programs can be private or public.

  • Public programs are available to anyone registered on the platform where the program is ongoing.

  • Private programs are available to bug bounty hunters who have earned an invitation thanks to their performance.

Lastly, all hunters must comply to the platform’s code of conduct and to the specific program’s scope, its limitations, policy, and rules.

Take time to carefully read both of these aspects before starting your activities.


Reporting your Findings

Bug reports should include information on how exploitation of each vulnerability can be reproduced step-by-step. The elements for a good report are:

  • Vulnerability Title: vulnerability type, affected endpoint, affected parameter(s) and authentication requirements.

  • CWE & CVSS Score: to describe the characteristics and severity of the vulnerability.

  • Vulnerability Description: explain the cause and everything about the vulnerability and the specific instance you are reporting.

  • Proof of Concept: use screenshots to show the steps to reproduce the identification and exploitation phases of the identified vulnerability. Remember to include all steps to ensure an easier time while triaging.

  • Impact: write some example scenarios that an attacker can achieve by fully exploiting the vulnerability. Try to also include information about the vulnerability's business impact and damage.

  • Remediation (optional): provide guidance about how to fix the issue

Example Reports

You can find some great report examples below:


Triaging Phase

Remember to always be professional during all communication. This will help to ensure that the triaging phase goes as fast and as smoothly as possible.

During your triaging phase, you might have disagreements about the severity of the bug or its bounty award. Keep in mind that a bug's impact and severity play a significant role during the bounty amount assignment.

Whenever facing any disagreement, try to:

  • Explain the rationale for the severity score, guiding the triage team through each metric value used to calculate your CVSS score.

  • Review the program's policy and score, showing that your submission is compliant to the program's statements.

  • If nothing works, contact mediation or a similar platform service.

Last updated 10 months ago

Was this helpful?

If you submitted your report and have been waiting for a reasonable amount of time before having any response, you can contact .

🐛
https://hackerone.com/reports/341876
https://hackerone.com/reports/783877
https://hackerone.com/reports/980511
https://hackerone.com/reports/691611
https://hackerone.com/reports/474656
Mediation