Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lab Manual On Bug - Bounty

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

LAB MANUAL

ON
BUG & BOUNTY

ESTABLISHMENT OF ADVANCED LABORATORY FOR CYBER SECURITY


TRAINING TO TECHNICAL TEACHERS
DEPARTMENT OF INFORMATION MANAGEMENT AND COORDINATION
SPONSORED BY MINISTRY OF ELECTRONICS AND INFORMATION
TECHNOLOGY
GOVERNMENT OF INDIA
Principal Investigator: Prof. Maitreyee Dutta
Co Investigator: Prof. Shyam Sundar Pattnaik

PREPARED BY:
Prof. Maitreyee Dutta and Ms. Purnima Mohanty (Project Assistant)

1
Table of Contents
Introduction to Bug & Bounty ..............................................................3
Security Bug ......................................................................................3
What is Bug Bounty? ........................................................................4
History of Bug Bounty ......................................................................4
Graphical Report ...............................................................................6
Sample of Bug Bounty XSS found in Mail.......................................6
Installation of Visual Studio ..................................................................9
Installation and completion .............................................................12
Introduction to Wamp Server ..............................................................13
To activate WAMP ..........................................................................22
Introduction to Xtreme Vulnerable Web Application ........................23

2
Introduction to Bug & Bounty
Security Bug
A security bug or security defect is a software bug that can be
exploited to gain unauthorized access or privileges on a computer
system. Security bugs introduce security vulnerabilities by
compromising one or more of Authentication of users and other
entities. Security bugs introduce security vulnerabilities by
compromising one or more of:

 Authentication of users and other entities


 Authorization of access rights and privileges
 Data confidentiality
 Data integrity

On September 9, 1947, a team of computer scientists and engineers


reported the world’s first computer bug. A bug is a flaw or glitch in a
system. Thomas Edison reported “bugs” in his designs as early as the
1800s, but this was the first bug identified in a computer. First case of
bug being found,” one of the team members wrote in the logbook.
The team at Harvard University in Cambridge, Massachusetts, found
that their computer, the Mark II, was delivering consistent errors. The
first report of bug was delivered by Grace Hopper.

3
What is Bug Bounty?
A bug bounty program is a deal offered by many websites,
organizations and software developers by which individuals can
receive recognition and compensation for reporting bugs, especially
those pertaining to security exploits and vulnerabilities. These
programs allow the developers to discover and resolve bugs before
the general public is aware of them, preventing incidents of
widespread abuse. Bug bounty programs have been implemented by a
large number of organizations. A bug bounty program is a deal
offered by many websites, organizations and software developers by
which individuals can receive recognition and compensation for
reporting bugs, especially those pertaining to security exploits and
vulnerabilities.

History of Bug Bounty


Three years back when Ola was hacked, compromising the data of
millions of users, they created India’s first full-fledged bug bounty
program to encourage independent security researchers to help them
create a safe platform. The company now offers up to 3,00,000 INR
for security loopholes such as injections, server-side issues, client-
side issues, and other valid security vulnerabilities. Ola has seen
success with its program. Security research bloggers from Fallible say
Ola awarded them with $1000 in bounty and some electronic goodies
for reporting vulnerabilities in one of their apps. The researchers also

4
claim Ola took around 2 months to fix their reported bug. McDonalds
India (West and South) runs a bug bounty program in India for its
web and mobile apps for McDelivery. In 2017, researchers from
Fallible discovered a huge vulnerability in their app. They found it
was possible for hackers to dump the data of 2.2 million users by
exploiting a flaw. Paytm is another company running a bug bounty
program in India. Avinash Jain, an independent security researcher
found a vulnerability in Paytm’s electricity bill payment service.
Sandeep reveals bug bounty hunting allows you to be your own boss,
and work with freedom and flexibility.From 2016, nullcon has started
a BountyCraft Track. It is a platform where the Bug Bounty Program
offering companies (Microsoft,Apple, Google) & crowdsourced
security platforms (Bugcrowd, Hackerone, NCC Group, Crowdfense)
interact directly with Bug

5
Graphical Report

Sample of Bug Bounty XSS found in Mail

6
The objective is to search for organizations that announce and provide
a professional and transparent ecosystem for carrying out security
testing, reporting and payments, while indemnifying the tester from
any legal or other action. Permission will be obtained from the
organization that has announced the program. At the very least, a
record of start date, end date and access times will be maintained and
may be shared with the organization if needed. Vulnerability will be
exploited only for the purpose of getting a screenshot of the extent of
penetration into the organization's infrastructure. All testing will be
non-destructive. Making changes in source code of programs running
on the organization infrastructure or in documents stored on the
systems to which access has been obtained. No data or documents
will be copied from any of the vulnerable systems on which access
has been obtained during the course of searching for bugs and
vulnerabilities. No testing will be done for "information" or
"knowledge enhancement" purposes as this is a professional activity
and one expects to earn from the same. Payments as per the payout
norms of the organizing company will be accepted without dispute.
Any bug / vulnerability / issue that is reported under a bug bounty
program will be released in public only after it has been repaired by
the affected organization.

7
8
Installation of Visual Studio
Step 1:- Open google website and type “Microsoft support”

Step 2:- After getting the page type visual studio in search

9
Step 3:- click on latest download

Step 4:- download all support set up

Step5:- Install the Setup

10
Step: 6:- agreement to policy and condition

11
Installation and completion
Step 1:- Install Microsoft Visual

Step 1:- Setup Successful

12
Introduction to Wamp Server
Wamp Server refers to a solution stack for the Microsoft Windows
operating system, created by Romain Bourdon and consisting of the
Apache web server, Open SSL for SSL support, MySQL database and
PHP programming language. Stands for "Windows, Apache, MySQL,
and PHP." WAMP is a variation of LAMP for Windows systems and
is often installed as a software bundle (Apache, MySQL, and PHP). It
is often used for web development and internal testing but may also
be used to serve live websites.

Step 1:- Download Wamp Server

Step 2:- Download Wamp From Given Site


13
Step 3:- click on download

14
Now it is downloaded in our system

Step 4:- click on language and ok

Step 5:- click on I accept

15
Step 6:- On Information Wizard Click On Next

Step 7:- Select the destination click on next

16
Step 8:- Select components

Step 9:- We can edit the name

17
Step 10:- Showing the installation is ready

Step 11:- Installation process is going on

Step 12:-Click on yes for linking to web browser

18
Step13:- Linking notepad

19
Step 14:- Select destination location

Step 15:- Installation and Warning

20
Step 16:- Click on finish

21
To activate WAMP

In Firefox write local host

22
Introduction to Xtreme Vulnerable
Web Application
Xtreme Vulnerable Web Application (XVMA) is a badly coded web
application written in PHP/MySQL that helps security enthusiasts to
learn application security.

Step1: Type XVWA download in the dialogue box

Step 2: After getting XVWA in search

23
Step 3: Open the website Github

Step 4: Download the ZIP file

Step 5: Save the folder XVWA

24
Step 6: Open XVWA-Master folder

Step 7: Search for wamp64 folder

Step 8: Open wamp64 folder

Step 9: Then Open wampthemes folder

25
Step 10: Run xvwa in local server

Step 11: Fill login credentials

26
Step 12: Here it is showing the General setting

Step 13: Run SQL query/queries

27
Step 14: Click on SQL > then run query.

Step 15: MYsql returned an Empty result

28
Step 16: Run XVWA in local server

Step 17: Setup Settings

29
Step 18: XVWA Instruction

Step 19: Fill Credentials to login.

30

You might also like