Lab Manual On Bug - Bounty
Lab Manual On Bug - Bounty
Lab Manual On Bug - Bounty
ON
BUG & BOUNTY
PREPARED BY:
Prof. Maitreyee Dutta and Ms. Purnima Mohanty (Project Assistant)
1
Table of Contents
Introduction to Bug & Bounty ..............................................................3
Security Bug ......................................................................................3
What is Bug Bounty? ........................................................................4
History of Bug Bounty ......................................................................4
Graphical Report ...............................................................................6
Sample of Bug Bounty XSS found in Mail.......................................6
Installation of Visual Studio ..................................................................9
Installation and completion .............................................................12
Introduction to Wamp Server ..............................................................13
To activate WAMP ..........................................................................22
Introduction to Xtreme Vulnerable Web Application ........................23
2
Introduction to Bug & Bounty
Security Bug
A security bug or security defect is a software bug that can be
exploited to gain unauthorized access or privileges on a computer
system. Security bugs introduce security vulnerabilities by
compromising one or more of Authentication of users and other
entities. Security bugs introduce security vulnerabilities by
compromising one or more of:
3
What is Bug Bounty?
A bug bounty program is a deal offered by many websites,
organizations and software developers by which individuals can
receive recognition and compensation for reporting bugs, especially
those pertaining to security exploits and vulnerabilities. These
programs allow the developers to discover and resolve bugs before
the general public is aware of them, preventing incidents of
widespread abuse. Bug bounty programs have been implemented by a
large number of organizations. A bug bounty program is a deal
offered by many websites, organizations and software developers by
which individuals can receive recognition and compensation for
reporting bugs, especially those pertaining to security exploits and
vulnerabilities.
4
claim Ola took around 2 months to fix their reported bug. McDonalds
India (West and South) runs a bug bounty program in India for its
web and mobile apps for McDelivery. In 2017, researchers from
Fallible discovered a huge vulnerability in their app. They found it
was possible for hackers to dump the data of 2.2 million users by
exploiting a flaw. Paytm is another company running a bug bounty
program in India. Avinash Jain, an independent security researcher
found a vulnerability in Paytm’s electricity bill payment service.
Sandeep reveals bug bounty hunting allows you to be your own boss,
and work with freedom and flexibility.From 2016, nullcon has started
a BountyCraft Track. It is a platform where the Bug Bounty Program
offering companies (Microsoft,Apple, Google) & crowdsourced
security platforms (Bugcrowd, Hackerone, NCC Group, Crowdfense)
interact directly with Bug
5
Graphical Report
6
The objective is to search for organizations that announce and provide
a professional and transparent ecosystem for carrying out security
testing, reporting and payments, while indemnifying the tester from
any legal or other action. Permission will be obtained from the
organization that has announced the program. At the very least, a
record of start date, end date and access times will be maintained and
may be shared with the organization if needed. Vulnerability will be
exploited only for the purpose of getting a screenshot of the extent of
penetration into the organization's infrastructure. All testing will be
non-destructive. Making changes in source code of programs running
on the organization infrastructure or in documents stored on the
systems to which access has been obtained. No data or documents
will be copied from any of the vulnerable systems on which access
has been obtained during the course of searching for bugs and
vulnerabilities. No testing will be done for "information" or
"knowledge enhancement" purposes as this is a professional activity
and one expects to earn from the same. Payments as per the payout
norms of the organizing company will be accepted without dispute.
Any bug / vulnerability / issue that is reported under a bug bounty
program will be released in public only after it has been repaired by
the affected organization.
7
8
Installation of Visual Studio
Step 1:- Open google website and type “Microsoft support”
Step 2:- After getting the page type visual studio in search
9
Step 3:- click on latest download
10
Step: 6:- agreement to policy and condition
11
Installation and completion
Step 1:- Install Microsoft Visual
12
Introduction to Wamp Server
Wamp Server refers to a solution stack for the Microsoft Windows
operating system, created by Romain Bourdon and consisting of the
Apache web server, Open SSL for SSL support, MySQL database and
PHP programming language. Stands for "Windows, Apache, MySQL,
and PHP." WAMP is a variation of LAMP for Windows systems and
is often installed as a software bundle (Apache, MySQL, and PHP). It
is often used for web development and internal testing but may also
be used to serve live websites.
14
Now it is downloaded in our system
15
Step 6:- On Information Wizard Click On Next
16
Step 8:- Select components
17
Step 10:- Showing the installation is ready
18
Step13:- Linking notepad
19
Step 14:- Select destination location
20
Step 16:- Click on finish
21
To activate WAMP
22
Introduction to Xtreme Vulnerable
Web Application
Xtreme Vulnerable Web Application (XVMA) is a badly coded web
application written in PHP/MySQL that helps security enthusiasts to
learn application security.
23
Step 3: Open the website Github
24
Step 6: Open XVWA-Master folder
25
Step 10: Run xvwa in local server
26
Step 12: Here it is showing the General setting
27
Step 14: Click on SQL > then run query.
28
Step 16: Run XVWA in local server
29
Step 18: XVWA Instruction
30