Search This Blog

Wednesday, May 31, 2023

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

More info


  1. Pentest Tools Nmap
  2. Hacker Tools For Windows
  3. Hacking Tools Software
  4. Hacking Apps
  5. Hacker Tools
  6. Pentest Tools Online
  7. Hack Apps
  8. Hak5 Tools
  9. Usb Pentest Tools
  10. Blackhat Hacker Tools
  11. Best Hacking Tools 2019
  12. Hacking Tools Windows
  13. Install Pentest Tools Ubuntu
  14. Physical Pentest Tools
  15. Hacking Tools
  16. Underground Hacker Sites
  17. Hack And Tools
  18. Hacker Tools Linux
  19. Hack Tools Github
  20. Hacking Tools For Windows
  21. Hacking Apps
  22. Hacker Tools For Ios
  23. Tools For Hacker
  24. Hacker Tools
  25. Underground Hacker Sites
  26. Hak5 Tools
  27. Growth Hacker Tools
  28. Hacking Tools For Windows Free Download
  29. Hacking Tools For Windows
  30. How To Make Hacking Tools
  31. Hacker Tools Software
  32. Hacker Hardware Tools
  33. Hack App
  34. Hackrf Tools
  35. Best Pentesting Tools 2018
  36. Pentest Tools Tcp Port Scanner
  37. Hacker Hardware Tools
  38. World No 1 Hacker Software
  39. Pentest Tools Bluekeep
  40. Hack Website Online Tool
  41. What Is Hacking Tools
  42. Hacking Apps
  43. Kik Hack Tools
  44. Hacking Tools Usb
  45. Hack Tool Apk
  46. Hacker Tools Hardware
  47. Hacker Tools Mac
  48. Pentest Tools Alternative
  49. Pentest Tools Website Vulnerability
  50. Hack Tools Online
  51. Hacking Tools Download
  52. Hackers Toolbox
  53. Pentest Tools Find Subdomains
  54. Pentest Tools Framework
  55. Pentest Tools List
  56. Hacking Tools For Windows 7
  57. Hack Tools Online
  58. Pentest Tools Website
  59. Pentest Tools Find Subdomains
  60. Hacking App
  61. Free Pentest Tools For Windows
  62. Game Hacking
  63. Pentest Tools
  64. Hack Rom Tools
  65. Hacker Tools Hardware
  66. Pentest Tools Download
  67. Hacker Search Tools
  68. Nsa Hacker Tools
  69. Pentest Tools Open Source
  70. Pentest Tools Linux
  71. Hacker Tools Apk Download
  72. Pentest Tools Website Vulnerability
  73. Pentest Tools Github
  74. Hacker Techniques Tools And Incident Handling
  75. Hack Apps
  76. Black Hat Hacker Tools
  77. Hackers Toolbox
  78. Hacking Tools 2020
  79. Hacking Tools Kit
  80. Pentest Tools Framework
  81. Hack Tools For Pc
  82. What Are Hacking Tools
  83. Pentest Tools Kali Linux
  84. Hacking Tools Mac
  85. Hack Tools For Windows
  86. Kik Hack Tools
  87. Hack Tool Apk
  88. Hacker Tools For Pc
  89. Pentest Tools Windows
  90. How To Install Pentest Tools In Ubuntu
  91. Hacking Tools For Games
  92. Tools For Hacker
  93. Pentest Tools For Mac
  94. Easy Hack Tools
  95. Hack Tools Github
  96. Hacking Tools Name
  97. Growth Hacker Tools
  98. Pentest Box Tools Download
  99. Top Pentest Tools
  100. Hacker Tools Software
  101. How To Install Pentest Tools In Ubuntu
  102. New Hack Tools
  103. Hacking Tools For Windows Free Download
  104. Hacking Tools
  105. Hacking Tools For Kali Linux
  106. Hacking Tools Software
  107. Hacker Tools Linux
  108. Pentest Tools Find Subdomains
  109. Best Pentesting Tools 2018
  110. Hacking Tools 2019
  111. Hack App
  112. Pentest Tools Free
  113. Hacking Tools For Windows
  114. Hacking Tools 2019
  115. Hacking Tools For Windows 7
  116. How To Make Hacking Tools
  117. Hacking Tools Download
  118. Hack Tool Apk No Root
  119. Best Hacking Tools 2020
  120. Bluetooth Hacking Tools Kali
  121. Tools 4 Hack
  122. Hacker Tools For Pc
  123. Hack Tools For Windows
  124. Pentest Tools Find Subdomains
  125. Physical Pentest Tools
  126. New Hacker Tools
  127. Hack Tools
  128. Hacker Tools Windows
  129. Hacker Tools Github
  130. Hacker Hardware Tools
  131. Hacker Tools Software
  132. Pentest Recon Tools
  133. Hacker Tools Mac
  134. Pentest Tools List
  135. Hacker
  136. Hacking Tools
  137. Hacking Tools For Windows Free Download
  138. Pentest Tools List
  139. Hacking Tools For Windows
  140. Hack Website Online Tool
  141. Hacking Tools Windows 10
  142. Hacker Tools Apk Download
  143. Hacking Tools Name
  144. Hacker Tools Online
  145. Hack Tools Download

USE OF CRYPTOGRAPHY IN HACKING

WHAT IS CRYPTOGRAPHY?

The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.

As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.

Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .

                            Or

Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.

In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.

This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .



How to Encrypt and Decrypt the text in Cryptography?

Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" 

Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"

Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.




               
       







Read more

  1. Pentest Tools Online
  2. Bluetooth Hacking Tools Kali
  3. Pentest Tools List
  4. Pentest Tools For Android
  5. Hack Tools For Pc
  6. Best Pentesting Tools 2018
  7. Blackhat Hacker Tools
  8. Blackhat Hacker Tools
  9. Hacking Tools Windows
  10. Pentest Tools Framework
  11. Hacking Tools For Windows Free Download
  12. Hacking Tools And Software
  13. Hacking Tools Download
  14. Hacker Tools For Ios
  15. Pentest Tools Review
  16. Hacking Tools For Windows 7
  17. Pentest Tools Review
  18. Nsa Hack Tools
  19. Hacking Tools Online
  20. Hacking Tools For Windows
  21. Hacking Tools For Games
  22. Hacking Tools Usb
  23. Black Hat Hacker Tools
  24. Hack Tools For Mac
  25. Hacker Tools For Mac
  26. Pentest Tools Url Fuzzer
  27. Install Pentest Tools Ubuntu
  28. Hacker Tools Github
  29. Hack And Tools
  30. Hacking Tools Kit
  31. Hacking Tools Usb
  32. Hack Tool Apk No Root
  33. What Is Hacking Tools
  34. Hacking Apps
  35. Hack Tools For Games
  36. Pentest Tools Review
  37. Best Hacking Tools 2019
  38. Hacking Tools Pc
  39. Pentest Tools Windows
  40. Hack Tools Download
  41. Hack Apps
  42. Hacker Tools Apk Download
  43. Pentest Tools List
  44. Pentest Tools Bluekeep
  45. Hacker Tools Linux
  46. Hacker Tools For Pc
  47. Best Pentesting Tools 2018
  48. Blackhat Hacker Tools
  49. Nsa Hacker Tools
  50. Pentest Tools Windows
  51. Pentest Automation Tools
  52. Hack Tools Pc
  53. Pentest Tools Subdomain
  54. Pentest Tools For Ubuntu
  55. Pentest Tools Android
  56. Hackrf Tools
  57. Hack Tool Apk No Root
  58. Hacking Tools For Kali Linux
  59. Hack Website Online Tool
  60. Best Hacking Tools 2020
  61. Hacker Tools For Pc
  62. Hacking Tools For Windows 7
  63. Nsa Hack Tools Download
  64. World No 1 Hacker Software
  65. Hacking Tools Download
  66. Pentest Tools Android
  67. Pentest Tools For Android
  68. Pentest Tools Subdomain
  69. Blackhat Hacker Tools
  70. Pentest Tools Windows
  71. Hak5 Tools
  72. Hack Tools Mac
  73. Hacker Tools Free Download
  74. Hacking Tools Online
  75. Black Hat Hacker Tools
  76. Hacker
  77. Hacking Tools For Windows Free Download
  78. Hack Tools For Ubuntu
  79. Pentest Tools Website
  80. Pentest Tools For Ubuntu
  81. Pentest Tools Kali Linux
  82. Pentest Tools Tcp Port Scanner
  83. Wifi Hacker Tools For Windows
  84. Hack And Tools
  85. Hacking Tools For Games

Hackerhubb.blogspot.com

Hackerhubb.blogspot.com

Related news


  1. Hack Tools Download
  2. Pentest Tools Free
  3. Pentest Tools For Ubuntu
  4. Hacking Tools Kit
  5. Pentest Tools Framework
  6. Hacking Apps
  7. Hacking Tools Kit
  8. Hacking Tools Windows 10
  9. Hack Tools For Ubuntu
  10. Hack Tools 2019
  11. Pentest Tools Github
  12. Pentest Tools Open Source
  13. Hacking Tools 2019
  14. Hacker Tools For Ios
  15. Hacking Tools Online
  16. Hacking Apps
  17. Hacking Tools 2020
  18. Hacker Tools For Mac
  19. Hack Tool Apk
  20. Tools For Hacker
  21. Hacker Tools Software
  22. How To Hack
  23. Pentest Tools Apk
  24. Hack Tools Mac
  25. Nsa Hack Tools
  26. Nsa Hack Tools
  27. Hacker Hardware Tools
  28. Hacking Tools For Windows
  29. Hacking Tools For Pc
  30. Black Hat Hacker Tools
  31. Best Hacking Tools 2020
  32. Pentest Tools Website
  33. Pentest Tools For Ubuntu
  34. Wifi Hacker Tools For Windows
  35. Hacking Tools Usb
  36. Pentest Tools Website Vulnerability
  37. Github Hacking Tools
  38. Hacking Tools Name
  39. Beginner Hacker Tools
  40. Hacking Tools Software
  41. Hacking Tools For Pc
  42. Growth Hacker Tools
  43. Hack Tools For Mac
  44. Hacking Tools
  45. Hacker Tools For Mac
  46. Hack Tools For Windows
  47. Hacking Tools Github
  48. Hacker Tools
  49. Best Pentesting Tools 2018
  50. Hack Tools Online
  51. Pentest Tools Url Fuzzer
  52. Hacking Tools Mac
  53. Hacking Tools Windows 10
  54. Pentest Tools Github
  55. Growth Hacker Tools
  56. Pentest Tools Subdomain
  57. How To Make Hacking Tools
  58. Pentest Tools Windows
  59. Hack Tools Pc
  60. Hacker Tools Windows
  61. Hacking Tools Name
  62. Hack Tools For Pc
  63. Pentest Tools List
  64. Computer Hacker
  65. Nsa Hacker Tools
  66. Tools For Hacker
  67. Hacking Tools Pc
  68. Hack Tools
  69. Pentest Tools Android
  70. Pentest Tools Website Vulnerability
  71. Hacking Tools

Tuesday, May 30, 2023

How To Secure Your Home Against "Internet Of Things" And FUD

TL;DR, most of the security news about IoT is full of FUD. Always put the risks in context - who can exploit this and what can the attacker do with it. Most story only covers the latter.

Introduction

There is rarely a day without news that another "Internet of Things" got hacked. "Smart" safes, "smart" rifles, "smart" cars, "smart" fridges, "smart" TVs, "smart" alarm systems, "smart" meters, "smart" bulbs, NAS devices, routers. These devices are getting hacked every day. Because most of these devices were never designed with security as a goal, and some of them have been never tested by security professionals, it is no surprise that these things are full of vulnerabilities.





Independent security researchers find these vulnerabilities, write a cool blog post or give a presentation about the vulnerability and the exploit, and the media forgets the constraints just for the sake of more clicks. "We are all doomed" we can read in the news, but sometimes the risks are buried deeply in technical jargon. Please note I blame the news sites here, not the researchers.

http://www.slideshare.net/danielmiessler/iot-attack-surfaces-defcon-2015

There are huge differences between the following risks:

  • Attackers can directly communicate with the router (or camera) from the Internet without authentication and exploit the vulnerability. This is the worst-case scenario. For example, an automated ransomware attack against your NAS is pretty bad.
  • Attackers have to position themselves in the same WAN network (e.g. Sprint mobile network in the case of Jeep hacking) to exploit the vulnerability. This is still pretty bad.
  • The vulnerable code can not be triggered directly from the Internet, but tricks like CSRF can be used to exploit it (details later in this post). 
  • The vulnerable code can not be triggered directly from the Internet, and it uses a protocol/port which prevents Cross Protocol Scripting. Attackers have to access the local network before exploiting this vulnerability.
As it is the case with the worst scenario, one can find a lot of devices connected to the internet. You can always find funny stuff at http://explorer.shodanhq.com/#/explore , or use the nmap screenshot script to find your own stuff :)


Network exposure

Most devices are behind an IPv4 NAT device (e.g. home router), thus can not be reached from the Internet side by default. Except when the device configures the firewall via UPNP. Or the device has a persistence cloud connection, and the cloud can send commands to the device. Or the device uses IPv6 tunneling (e.g. Teredo), thus it is reachable from the Internet. But not every vulnerability on your home network is accessible directly from the Internet. As more and more devices and networks will support IPv6, this scenario might change, but I hope most home routers will come with a default deny configuration in their IPv6 firewall module. On the other hand, scanning for IPv6 devices blindly is not feasible due to the large number of IPv6 addresses, but some tricks might work

If attackers can not access the device directly, there is a way to hack it through the user's browser. Just convince the victim user to visit a website, and via CSRF (Cross Site Request Forgery) and brute-forcing the device IP, it is possible to hack some devices (mostly through HTTP - if the exploit can fit into simple GET or POST commands.

If attackers can not attack the device vulnerability through the Internet directly, or via CSRF, but have connected to the same network - the network exposure shrinks significantly. And when attackers are on the same network as you, I bet you have bigger problems than the security of the IoT devices ...

Recommendations for home users

Don't buy **** you don't need

Disconnect from the power cord the IoT devices you don't need to operate 7*24. 

Disable cloud connectivity if it is not necessary. For example, I have a NAS device that can be reached through the "cloud", but I have disabled it by not configuring any default gateway for the device. I prefer connecting to my network via VPN and reach all my stuff through that.

Prevent CSRF attacks. I use two tricks. Don't use the 192.168.0.x - 192.168.10.x network at-home - use an uncommon IP range instead (e.g. 192.168.156.x is better). The second trick is I configured my Adblock plugin in my primary browser to block access to my internal network. And I use another browser whenever I want to access my internal devices. Update: On Firefox you can use NoScript ABE to block access to internal resources.


Check your router configuration:

  • disable UPnP
  • check the firewall settings and disable unnecessary port forwards
  • check for IPv6 settings, and configure the firewall as default deny for incoming IPv6 TCP/UDP.

Change default passwords, especially for services connected to the Internet. Follow password best practices.

Run Nmap to locate new IoT in your home network :) 

Run a WiFi scan to locate new WiFi access points. Let me share a personal experience with you. I moved to a new house and brought my own WiFi router with me. I plugged it in, and forget about WiFi. Months later it turned out I had two other WiFi devices in my house - the cable modem had its own integrated WiFi with default passwords printed on the bottom, and the Set-top-box was the same - default WiFi passwords printed on the bottom. And don't forget to scan for ZigBee, Bluetooth, IrDA, FM, ...

Update your devices - in case you have a lot of free time in your hand.

Don't allow your guests to connect to your home network. Set up a separated AP for them. Imagine your nephew stealing your private photos or videos from your NAS or DNLA server.

With great power, comes great responsibility. The less device you own in your house, the less time you need to maintain those.

Read the manuals of your devices. Be aware of the different interfaces. Configure it in a secure way.

Disable Teredo protocol in case you don't need IPv6.

Stop being amazed by junk hacking.

Update: Disable WebRTC: https://www.browserleaks.com/webrtc , in Chrome you can use this extension: https://chrome.google.com/webstore/detail/webrtc-network-limiter/npeicpdbkakmehahjeeohfdhnlpdklia

Update: Prevent against DNS rebind attacks via configuring a DNS server which can block internal IP addresses. OpenDNS can block internal IP, but this is not a default option, you have to configure it.

Recommendations for vendors

For vendors, I recommend at least the followings:

  • Implement security during Software Development LifeCycle
  • Continuous security testing and bug bounties
  • Seamless auto-update
  • Opt-in cloud connectivity

Recommendations for journalists

Stop FUD. Pretty please.

The questions to ask before losing your head

  • who can exploit the vulnerability?
  • what prerequisites do we have about the attack to successfully exploit the vulnerability? Is the attacker already in your home network? If yes, you have probably bigger problems.
  • what can the attacker do when the exploit is successful?

And last but not least, don't forget that in the case of IoT devices, sometimes users are the product, not the customer. IoT is about collecting data for marketing purposes.


Related links