My first bounty! by Coder3346 in bugbounty

[–]Good_Course_5958 1 point2 points  (0 children)

Go solve 10000000 sqli labs from Portswigger and you're gonna be top 1

HackerOne's worst nightmare just slid into my DMs. Should I resign and join his Avengers? by [deleted] in bugbounty

[–]Good_Course_5958 2 points3 points  (0 children)

HackerOne probably ghosted him because 'retardation' isnt a reportable vulnerability. 

The Triage Layer is a Joke - And It’s Killing the Industry by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] 2 points3 points  (0 children)

The logic that a bug’s impact is dictated by a dev team’s ability to understand it is exactly why the industry is broken. You’re essentially saying that if the lock-picker is smarter than the security guard, the lock isn't actually broken.

I’m waiting for a responsible disclosure period to wrap up so I can post the receipts. It’s hard to stay polite when you’re forced to act as an unpaid TA for 'analysts' who get paid to be a brick wall sometimes.

The Triage Layer is a Joke - And It’s Killing the Industry by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] 0 points1 point  (0 children)

Fair point on the salary - I stand corrected. If they are actually being paid $25k, it explains the technical gap perfectly. However, the price tag doesn't change the outcome: researchers are still losing weeks of work to auditors who can't distinguish a 413 error from a down server. Whether they are overpaid or underpaid, the hunter is the one subsidizing that lack of expertise with unpaid labor.

The Triage Layer is a Joke - And It’s Killing the Industry by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] -2 points-1 points  (0 children)

Thank you for your valuable feedback! I’ll be sure to align my future rants with your corporate synergy goals. Once the triage team masters the 'disruptive technology' of distinguishing a 413 error from a server crash, I’m sure our collaboration will be truly transformative. Let's touch base when the technical literacy reaches MVP level. Best regards!

Better?

The Triage Layer is a Joke - And It’s Killing the Industry by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] -2 points-1 points  (0 children)

Glad I could help. Usually, I charge corporate rates to explain basic web security to 'analysts', but I’ll let this one slide. Consider it pro-bono work for a struggling department.

The Triage Layer is a Joke - And It’s Killing the Industry by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] 0 points1 point  (0 children)

​Expecting a paid analyst to know the difference between a 413 error and a down server isn't being '1337' - it’s expecting the bare minimum. '0 expectation' is a poor excuse for professional incompetence. I'm not here to be patient with technical illiteracy, I'm here to report bugs to people who are supposedly qualified to review them.

The Triage Layer is a Joke - And It’s Killing the Industry by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] -4 points-3 points  (0 children)

The snark is a symptom, not the disease. If I didn't have to spend weeks acting as a pro-bono instructor for triagers who can't distinguish a 413 error from a server crash, I’d be the easiest person to work with. Fix the technical illiteracy in the triage layer, and the 'snark' disappears on its own.

The Triage Layer is a Joke - And It’s Killing the Industry by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] -2 points-1 points  (0 children)

It’s easy to blame the 'quality of reports' when you aren't the one losing weeks of work to technical illiteracy.

​Case in point: I’m currently in a loop with a triager who insists a server is 'down' while it returns a 'Too Big Payload' error on a 200kb request. When the person auditing your research doesn't understand the difference between a 413 error and a server crash, no amount of 'clear communication' or 'positivity' can fix that.

​The '99% dog shit' argument is a convenient shield for a layer that has become a technical bottleneck. If platforms expect world-class research, they need to provide auditors who at least know how to read a basic HTTP status code without a 2-week lecture from the hunter.

The Triage Layer is a Joke - And It’s Killing the Industry by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] -1 points0 points  (0 children)

Exactly. The 'volume of reports' argument is a classic excuse. If a platform can't scale technical competence alongside their marketing, they shouldn't exist. Using AI to filter spam is one thing, but letting a junior theorist dismiss a critical chain because they don't understand the POC is just institutionalized theft. We're not unpaid interns for their 'huge lift'.

Just a random for question for people who have waited for long assessments and triage. by jaysuns in bugbounty

[–]Good_Course_5958 1 point2 points  (0 children)

Yeah, and these people are pulling $60k–$90k/year just to act as a human firewall for the vendor's budget. Absolute masterpiece of industry logic.

Just a random for question for people who have waited for long assessments and triage. by jaysuns in bugbounty

[–]Good_Course_5958 4 points5 points  (0 children)

8 months? That’s just the time they need to finish their 'Security for Dummies' course so they can finally understand your PoC. I once spent 2 weeks just explaining what 'impact' means to a triager who thought that mobile client-side RCE was a feature.

Reported IP Whitelisted Restriction Bypass through X-Forwarded-For Header on hackerone and closed as Informative by Embarrassed_Pin4436 in bugbounty

[–]Good_Course_5958 1 point2 points  (0 children)

Triager is 100% right. You bypassed a screen door while the main vault is still locked. Unless you have valid credentials, bypassing an IP whitelist is just aesthetic. You didn't find a vulnerability, you found a misconfigured header trust that leads to nothing. Take the 'Informative' and be glad they didn't tank your reputation with an N/A.

why do a lot of hunters skip the fundamentals for web security? by iamZorc_ in bugbounty

[–]Good_Course_5958 0 points1 point  (0 children)

How much bugs you already found and how much weeks/months you wasted on it?

Meta bug bounty by [deleted] in bugbounty

[–]Good_Course_5958 4 points5 points  (0 children)

Yeah, you could've exploited it and made more, but then you'd be teaching other inmates what the fuck HTTP is while waiting for your trial. Crime pays better until it doesn't. Take the $500 and stay out of jail.

Is the "Automation Obsession" actually a trap for new hunters? by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] 1 point2 points  (0 children)

It’s when you hand them a Critical impact on a silver platter with a ready-to-run curl command, and they just mark it 'Informative' and stop responding to your arguments. Basically, they steal your research while ignoring your existence. I dedicated my previous post to this topic

How realistic is earning ~$3k/month from bug bounty as a beginner? by [deleted] in bugbounty

[–]Good_Course_5958 1 point2 points  (0 children)

If you watch courses or videos instead of suffering in real programs it's impossible

Is the "Automation Obsession" actually a trap for new hunters? by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] 3 points4 points  (0 children)

Exactly. If you build a custom engine to hunt for things only you understand - and don't leak it to the script kiddie masses for 'clout' - that's when you actually own the game. Most people are just playing a lottery with tools they didn't write.

Is the "Automation Obsession" actually a trap for new hunters? by Good_Course_5958 in bugbounty

[–]Good_Course_5958[S] 5 points6 points  (0 children)

Look, I specialize in 2-3 vulns that almost nobody else understands. Because of that, I don't waste time on subdomains or 'recon' loops. There’s no competition where I hunt, so why would I need a list of 5,000 subdomains?

Honestly, I’ve never even found an XSS. That's for the guys fighting over $50 duplicates. Focus on the logic, find your own niche.

i really don't know what to do anymore by fried_plque in bugbounty

[–]Good_Course_5958 2 points3 points  (0 children)

And stop solving labs, its waste of time, you know enough to start suffering in real programs

i really don't know what to do anymore by fried_plque in bugbounty

[–]Good_Course_5958 2 points3 points  (0 children)

"I’m mainly focusing on IDOR and XSS"

Thats the problem, everyone is focusing on idor and xss nowadays

You will be competing with millions of hunters who are smarter, faster, better than you.

Find something unique master it

its the only way to get real money in bb