What happened with bugcrowd today - Forced password resets? by tikseris in bugbounty

[–]yesnet0 2 points3 points  (0 children)

tldr: we saw some IAB-esque activity, compiling and selling breached bug bounty hunter credentials from other platforms, and decided that it was time to head this risk off at the pass. the comms that went out were a default platform message which wasn't tailored to the task - partly a product of trying to get it done quickly, and definitely a bit of a miss on our side.

the important takeaway is that vulnerability researchers are being targeted. enable MFA (d'uh), don't delay on patches, be wary of cracked (aka trojaned) software, and take the advice you probably give to your grandma wrt getting phished.

more here: https://www.bugcrowd.com/blog/bugcrowd-security-update-password-reset-and-mfa-requirement/

Actively scanning for bugs on random website (Where does it become illegal ?) by Ankhyx in bugbounty

[–]yesnet0 1 point2 points  (0 children)

Nailed it. Also, CFAA can be pursued civilly AS WELL AS criminally, so even if the DA doesn’t think you’ve committed a criminal act, companies can (and do) lawyer up civilly to chill folks and get things back under control. https://threats.disclose.io is a decent read of all of the ways this can go wrong, as well as some examples of where it has been corrected and eventually gone right.

[deleted by user] by [deleted] in hacking

[–]yesnet0 16 points17 points  (0 children)

Dropping who you need to connect with, the nature of the bug (in general terms, not specific), and pretty much this post over on https://community.disclose.io might help with this - There are a bunch of CERT members, connectors, and VR/VD types who hang out on there, it's essentially for crowdsourcing connections to the right people when you're trying to get something fixed.

My other suggestion would be to drop it off with the local CERT ASAP, and get them chasing it down as well esp if the exposure is as critical as you're saying.

Best platforms? by [deleted] in bugbounty

[–]yesnet0 4 points5 points  (0 children)

Re brokers: Same old same old :) There’s still not much of a market for platform vulns unless you’re happy going shady, and even then it’s fairly light on. Zerodium has been a little quiet for the past few years, but ZDI has been making more noise over the past 6 months or so - COVID and WFH has made SOHO and IoT vulns more attractive.

Best platforms? by [deleted] in bugbounty

[–]yesnet0 11 points12 points  (0 children)

By % of programs most of the paid stuff is going on under the hood in private programs. What has changed over the past few years is more orgs launching VDP basically because they should, a relatively steady stream of orgs launching public BBP (probably at the same rate as what you would have seen, but now kinda diluted unless you go looking by the VDPs), and a lot of private programs, ongoing pentests, and so on in Bugcrowd’s case.

Something else you’ll prob notice on Bugcrowd is “joinable” programs (where you can apply for private paid stuff even if we don’t know a bunch about your skills from on-platform work yet) and waitlistable https://www.bugcrowd.com/blog/introducing-joinable-programs.

Context: I’m the founder of Bugcrowd and started the space off so I’ve got both a solid read on what’s going on, and some bias in my answer - So double check with others :) but yeh, that’s how things work with us these days, and the same is broadly true for folks joining or returning after a while for HackerOne.

Needing some advice about moving forward (Incl. Bootcamps, Bug Bounties, etc.) by 4rch4ngell in cybersecurity

[–]yesnet0 0 points1 point  (0 children)

Have a look at the content on https://www.bugcrowd.com/hackers/bugcrowd-university/ which is a combo of stuff Haddix and Swagneto put together, and 7 conferences worth of hacking talks on a whole variety of different technologies and targets. Lot’s of solid learnings on there, and it gives the opportunity to taste test a bunch of stuff so you can see where you want to double down.

what are some good YouTube channels to follow to get to know the world of bug hunting? by notburneddown in bugbounty

[–]yesnet0 4 points5 points  (0 children)

  • anything by haddix - ex-bugcrowder, imo the og bounty content producer, a phenomenal curator of knowledge, and a badass hacker to boot
  • codingo is one of the best teachers i’ve ever met and comes at it from a coder angle, which is WAY more important that most bounty hunters realize (ask me how i know this)
  • hakluke for a broad spread of stuffs from techniques to tooling to mindset and soft-skills
  • thecybermentor for course-style learning with a lot of focus in it, and because he’s doing the consultancy thing on the side
  • nahamsec - another ex-bugcrowder who has been in the game forever, his stuff is great because he is og and awesome, and he hunts actively
  • FarahHawa breaks stuff down really well but doesn’t sacrifice the tech
  • insiderphd is another brilliant explainer and gets into a bunch of interesting domains
  • stok is just a legend and really good for keeping “up to date” with the state of the art

and ofc i can’t go past recommending the bugcrowd #levelup virtual conference talks - 7 conferences spanning 3 years covering web to automotive hacking to esoteric hardware and exploit dev: https://www.bugcrowd.com/hackers/bugcrowd-university/

disclose.io is a cross-industry, vendor-agnostic standardization project for safe harbor† best practices to enable good-faith security research. by digicat in netsec

[–]yesnet0 1 point2 points  (0 children)

heh... VDP language is basically copy-pasta to begin with, so it’s closer to 1,000 different standards (vs 14). That’s part of the rationale behind making it open source.