Burp Suite Bug Bounty

2/15/2022by admin
Bug

Burp Suite is made up of many interlinked tools, but a bug bounty hunting workflow will generally start with Burp Proxy. Proxying web traffic allows you to select individual components of a web app for further testing. These items can then be sent to other bug hunting tools within Burp Suite to check for vulnerabilities.

  1. This article is intended for penetration testers and bug bounty hunters as well as software developers who find it important to have security as a component of their development. BurpSuite has three editions that you can select from.
  2. Burp suite: this tool makes you Millionaire. I believe this course will be a tremendous guide for your bug bounty journey. This course contains rich, real world examples of security vulnerabilities testing and reports that resulted in real bug bounties.
  3. Introduction to Burp Suite! This burp suite guide will help you get your software setup and teach you a methodology that will lead you to success. Hacking tools are powerful but it’s important you know how to properly use them to their full potential. Learn how to setup burp proxies and scanners, fuzzing, how to use Burp Intruder, what to target in a bounty’s scope, and more.

Bug bounty tools

Burp ProxySite mapBurp ScannerContent discoveryBurp RepeaterBurp IntruderBurp Extender APIManual power tools
  • Burp Proxy

    Burp proxy is the foundation the rest of Burp Suite is built on. It's an intercepting proxy that allows you to see all HTTP communications sent between your browser and a target server. Crucially, it then allows you to edit the requests you send, or intercept and edit responses before they're sent to the browser. As you can imagine, it's a very useful bug bounty tool.

    Of course, most of the internet now uses the encrypted HTTPS standard, rather than unencrypted HTTP. Fortunately, Burp Proxy is able to see through HTTPS encryption by using a self-signed CA certificate.

    Read more
  • Site map

    The site map tool is one of Burp Suite's most widely used functions. You can generate a site map by manually navigating/proxying an app using Burp Scanner, and/or by using the content discovery function. Advanced crawling logic means Burp Scanner is capable of this even where a web app uses a lot of dynamic content.

    Burp Suite also includes a target scope configuration. By setting this, you can exclude out-of-scope content at a suite-wide level. This helps to keep you on track and out of trouble. You won't suddenly find that Burp Suite has run an active scan against out-of-scope web content, for instance.

    Read more
  • Burp Scanner

    Burp Scanner is Burp Suite Pro's most highly automated component. It protects many of the world's largest businesses and is used by the majority of pro pentesters. Our scanner covers the whole OWASP Top 10 - in addition to many other bugs - and you'll also have access to regular updates from our Research Team.

    Perhaps most importantly, Burp Scanner is customizable. This allows you to stay ahead of the crowd, by augmenting scans with your own routines. Once you've got it set up to your liking, Burp Scanner is like bug bounty hunting in easy mode.

    Read more
  • Content discovery

    Burp Suite Pro's content discovery function can expose attack surface that would otherwise be hidden to you. This generally means content and functionality not linked to from an app's visible areas. This can then be added to a site map.

    The content discovery function is fully adjustable and can use a variety of methods to discover hidden areas. These include word lists, web crawling, and extrapolation from previous successful guesses.

    Read more
  • Burp Repeater

    There are situations in manual bug bounty hunting where it's helpful to send similar (but subtly different) HTTP requests a number of times. You might be trying to determine a value for a certain parameter that will produce a desired effect, for example.

    Burp Repeater is designed to make these situations as easy as possible. As its name suggests, it allows you to take a single HTTP request, alter it as much (or as little) as you like, and send it at the touch of a button. In manual testing, this can save you a lot of time.

    Read more
  • Burp Intruder

    Burp Intruder allows you to orchestrate and direct customized attacks against a target. It's one of the killer automated features that make Burp Suite Pro such a powerful package. If you want to check a lot of different input variables across a web app for any particular reason (e.g. fuzzing, or another form of brute force attack), then this is your tool.

    For testing even larger numbers of payloads, there's a free extension called Turbo Intruder. Configured using Python for flexibility, Turbo Intruder is easily capable of exceeding 30,000 requests per second (RPS). To put this in perspective, many similar tools struggle to hit 1,000 RPS.

    Read more
  • Burp Extender API

    One of Burp Suite's real strengths is that anyone can write extensions using its Burp Extender API. You can then submit these to PortSwigger's free BApp store. So if you can think of a bug bounty tool or function you'd like to see in Burp Suite, you can more or less make it happen.

    This is how popular manual extensions like SAML Raider, Logger++, and Software Version Reporter came to be. Many of these extensions (like SAML Raider) are aimed at specific technologies - allowing you to customize Burp Suite to suit your own bug bounty interests.

    Read more
  • Manual power tools

    Burp Suite simplifies hacking by putting major bug hunting tools in front of you. But in addition to these better-known functions, it includes a whole host of smaller tools to make your life as a bug bounty hunter easier.

    A prime example is the cross-site request forgery (CSRF) proof of concept generator. Manually crafting HTML to trigger a CSRF exploit can be cumbersome - so this tool can do it for you. Burp Suite also includes tools to make encoding and decoding data simple - which means no more digging around for a Base64 or hex encoder.

About

BUG BOUNTY Village is a platform for bug bounty researchers and Infosec professionals to come and share their experiences. It's an apt place to learn bug bounty, report writing, teach and learn from others. With a series of talks/trainings and awards, we want to bring this fun platform to everyone.
Bug Bounty village includes two things :
The first one is “Unique Bug of the Year award / Best Bounty Hunter of the Year”. It aims to motivate and encourage researchers to write good and effective vulnerability reports. More interestingly if your vulnerability/ bug finding report gets duplicate ,do not worry, be happy, as we will also consider the duplicate reports in the submission. We understand how much time and effort a researcher/bug bounty hunter puts into finding a bug/vulnerability.
The second is “Talks and Workshops”. It aims at sharing knowledge with the bug bounty hunters and security community people who are already in Infosec field/ getting-started/ want to start a career in information security domain.
Motivate Share and Make Internet more secure

Call for Nominations

  • If you have reported a unique and good vulnerability in any target(Web, Mobile, IoT, Network) as part of the bug bounty program then submit your report to us.

  • If you have got duplicates ,feel free to share it with us. We will analyze it and try to do something to keep you motivated. We believe in your efforts.

  • Please report only those bugs which are already remediated.

  • If you have written any specific tool for bug hunting, do apply.

Guidelines for the report submission:

  • Report only bugs that have been fixed by the organization.

  • You can also submit reports of the private programs,which don't allow you to disclose the vulnerabilities. In this scenario, please omit the target name and required information by which the target can be identified.

  • Please submit the reports which have been submitted by you alone, do not copy-paste reports from the internet.

  • Submit the reports with POC (Proof of Concept) which signifies that the bug is disclosed to the organization.

Burp suite bug bounty box

Motivate Share and Make Internet more secure

Awards

Congratulation to all the winners

Arun Mishra

Hak 5 Gadget

Burp

Sunita

Pentester Lab

Speakers

  • Google VRP BugHunting

    Martin Straka

    Martin will cover the Google VRP programs, some interesting facts and new things added this year to our VRP programs and also the best bugs Google received from our researchers community in the last year.

    Register
  • Hacking the 0day Market

    Andrea

    The 0day vulnerability market developed over the years in a way that is unsafe, chaotic and rather inefficient. Bad business practices, lack of professionalism and low levels of trust are still spread in this market even today and can seriously hamper the ability of law enforcement and intelligence agencies to acquire and maintain strategic cyber capabilities in order to fight organized crime, terrorism and hostile geopolitical actors.Having a deep understanding of these issues and of their solutions, Crowdfense is “hacking the 0day market” in order to improve it for all the parties involved (researchers, customers, brokers, integrators and end users), by introducing new quality standards and best practices related to products, services and to the sustainability of the underlying business processes.This session will share how Crowdfense is doing this, why, what are the results, some statistics about the 0day market and what could be the next steps.

    Register
  • Exploiting Server-Side Applications

    Nimisha Dugalya

    The workshop is hands-on white-box testing of a php-based application. Most of the server-side web applications are made up of Php, this workshop will introduce the attendees to some common vulnerabilities in php applications. This session will be a ctf based session where the related challenges will be hosted and the participants who are well ahead of the basic topics can solve them while others catch up. Topics that will be covered in this session are - common php coding mistakes, code reviewing for loopholes, server-side request forgery, deserialization vulnerability. After the session participants will have a clear understanding of how to analyze a web application for php bugs.

    Register
  • Fuzzing softwares for Bugs

    Amol Naik

    This workshop focuses on the fuzzing softwares for bugs which will cover various techniques, tools & analysis techniques starting from file fuzzers till browser fuzzing.

    Register
  • Kubernetes - Overview and Exploitation

    Shikhar Joshi

    What to expect in the session:Overview of Docker (demo):- Creating a docker image user dockerfile - Uploading the docker image to docker hub - Creating a container from the image - Getting a shell within the container - Linux namespaceOverview of kubernetes architecture (theory/demo if time persists)- API Server - etcd - Controller - Scheduler - Kubelet - NodesCreation of kubernetes resources (demo)- pods - namespaces - replication controllers/sets - services - rolesExploiting kubernetes cluster (demo)- Understanding authentication and authorisation in kubernetes cluster - Understanding kubernetes secrets - Exploiting the cluster via misconfigured RBAC - Exploiting the cluster via exposed resources

    Register
  • Decoding Multiple Vulnerabilities on Pulse Secure VPN?

    Dhamotharan

    Pre-authentication arbitrary file read vulnerability (CVE-2019-11510) that revealed sensitive information like VPN client credentials, private SSH keys, and session cookies. They showed how this information was used to compromise a client session and gain access to a VPN network, then demonstrated additional post-authentication exploits that resulted in complete takeover of the VPN server. In order to exploit the issue, an attacker can send a malicious HTTP request containing directory traversal sequences along with a crafted Uniform Resource Identifier (URI) and access any file on the device.

    Register
  • Crypto for Bounty Hunters

    Shrutirupa Banerjiee

    Bug bounty is one of the common platform for security researchers to learn and earn more. There are researchers out there who sometimes miss certain domains and cryptography is one such domain which should never be forgotten. The session will talk about the basics of cryptography that a bug bounty hunter has to focus on to find cryptography related flaws. The audience will learn about how a simple cryptography flaw, once ignored, can be manipulated into a vulnerability. The audience will also get to know some common cryptography based exploits to achieve bounties. Meanwhile, the audience will also learn about different vulnerabilities and their exploitations with the help of some exercises that will be provided to them along with the explanation of each vulnerability. Some of the vulnerabilities which will be covered are: JWT misconfigurations openssl based flaws Oracle Padding cbc-ecb mode weak ssl ciphers Heartbleed and many more... The targeted audience is someone who has some basic knowledge in web application security along with having some enthusiasm to learn something different.

    Register
  • Mobexler: AIO Mobile Pentest VM

    Narendra

    Ever wished to have a virtual machine with tools for security testing of Android as well as iOS applications. Well, Mobexler is a mobile pentest VM that includes a wide variety of tools to help in Android and iOS pentesting. It includes tools for both static and dynamic analysis of applications, allowing pentesters to use a single virtual machine setup and perform pentest of Android and iOS applications, both. Based on elementary OS, Mobexler provides an awesome UI experience and allows for intuitive usage of tools just like you would on a host install. External devices like iPhone/iPad/Android devices can also be connected via USB or over TCP and can be used to perform security testing on applications. more details http://mobexler.com/

    Register
Burp Suite Bug Bounty

Review Committee

Eduardo Vela

Google

Laurie Mercer

HackerOne

Burp Suite Bug Bounty

Pranav Hivarekar

Nikhil Srivastava

Team

Praveen Yadav

Prashant K V

Narendra Kumar

Burp Suite Bug Bounty

Pankaj Upadhyay

Gallery

...

Sponsors

Contact Us for sponsoring Bug Bounty Village

Burp Suite Bug Bounty Box

PreviousNext

Location

International Centre Goa

Dr E Borges Rd, Dona Paula, Goa India- 403004,

Burp Suite Bug Bounty Bar

Google Maps

Comments are closed.