TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Beg Bounties (2021)

274 pointsby eiiotover 1 year ago

23 comments

mgaunardover 1 year ago
I remember when I was a teenager I found a huge security flaw in a website: they allowed to include any PHP file passed as a query string parameter, and that file could be a remote one too.<p>They didn&#x27;t listen to me and I found that offensive, so I used the flaw to get access, and leave a message on their FTP server. I didn&#x27;t destroy nor steal any data. They responded by reporting the incident to the police.
评论 #38248775 未加载
评论 #38248491 未加载
评论 #38247951 未加载
评论 #38248697 未加载
评论 #38250261 未加载
tptacekover 1 year ago
I don&#x27;t really understand the point of making a big stink about Beg Bounty Hunters. They&#x27;re invariably people in developing countries, for whom occasional SPF or Clickjacking payouts will be meaningful. And there&#x27;s an unbounded supply of them. They&#x27;re not going away. All you can control is the way you respond to them; lashing out at them in public seems like a pretty unhealthy response. Not for them; who cares? There&#x27;s going to be 20 more right behind them. But I mean, just for your own sense of well-being.
评论 #38246973 未加载
评论 #38246970 未加载
评论 #38246956 未加载
评论 #38246841 未加载
评论 #38247421 未加载
评论 #38246800 未加载
评论 #38248135 未加载
评论 #38249900 未加载
评论 #38249926 未加载
评论 #38246888 未加载
评论 #38249052 未加载
评论 #38246894 未加载
评论 #38246836 未加载
评论 #38247130 未加载
matheusmoreiraover 1 year ago
&gt; Alas, all reasonable measures were exhausted without response, I loaded the data into Have I Been Pwned (HIBP) and <i>then</i> they took notice<p>Every single time. They don&#x27;t really care about users, their safety and privacy. They care about legal liability and not looking foolish in public. It seriously makes me wish people would just publish vulnerabilities straight up complete with exploit source code so they&#x27;d have literally no choice but to care.
评论 #38246974 未加载
评论 #38247284 未加载
评论 #38248488 未加载
评论 #38246705 未加载
评论 #38247684 未加载
评论 #38254876 未加载
ipythonover 1 year ago
I run a domain for our community association. I had an “ethical hacker” discover that I had neglected to set up spf records for that domain. I had to deal with him sending a bunch of nasty emails to our other board members after I refused to pay him for his “discovery”. (Actually I offered him a cut of my salary as a board member, which at $0, came out to be… less than he was hoping for)<p>I’ll definitely keep a link to this for next time this happens.
评论 #38248874 未加载
cpercivaover 1 year ago
I get a lot of these but I have to admit I have a few favourites:<p>1. &quot;I can download archives of your public mailing list from your website!&quot;<p>2. &quot;I can download tarsnap source code from your website!&quot;<p>3. &quot;I can telnet to port 25 on your mail server and send you an email!&quot;<p>I have the misfortune of being an early offerer of bug bounties -- and being unusual in offering bounties for all bugs, not just security bugs -- which means that Tarsnap shows up pretty quickly when bounty beggars start looking for targets.
评论 #38246577 未加载
评论 #38246908 未加载
评论 #38246671 未加载
评论 #38247425 未加载
Ayeshover 1 year ago
I get that Troy is probably tired of receiving beg bounties, but as a security researcher himself, I find this post a bit distasteful and discouraging towards the people who could as well be on their way to finding bigger vulnerabilities.<p>Reports on lack of SPF&#x2F;DMARC records on security headers can be annoying, and often false, because there are some legitimate cases an SPF record with `~all` is necessary, or you have to have a permissive CSP for whatever reason.<p>I would have just deleted their email and moved on.
评论 #38248048 未加载
paranoidrobotover 1 year ago
e: I just noticed, this post was from 2 years ago. It should have (2021) in the header.<p>---<p>I help run a bug bounty program, we get a lot of submissions. Way too many of them are zero or low effort. The SPF meme one definitely resonates with me, we get it a whole lot.<p>Occasionally we will get someone who submits a half dozen variations of the same zero&#x2F;low-effort report. When we turn around and deny them all (because there&#x27;s no actual exploitable issue). There&#x27;s a good chance they will then spend the next week replying to our emails asking for money because they put a lot of effort into it, and&#x2F;or disputing our evaluation.<p>It&#x27;s frustrating dealing with that, and I can certainly sympathise with wanting to reply to someone who&#x27;s begging you for money with a &quot;no, go away&quot;.<p>Perhaps Troy just needed to blow off some steam, but I think he&#x27;d be better having a saved reply in his email saying he doesn&#x27;t pay bug bounties for personal projects&#x2F;sites, and just send that.<p>I think it&#x27;d go over better than having what seems to be an overly aggressive post.
评论 #38247092 未加载
bluedinoover 1 year ago
&gt; Want to be a bounty beggar? It&#x27;s dead simple, you just use tools like Qualys&#x27; SSL Labs, dmarcian or Scott Helme&#x27;s Security Headers, among others. Easy point and shoot magic and you don&#x27;t need to have any idea whatsoever what you&#x27;re doing<p>You&#x27;ve described 90% of our cybersecurity department.
评论 #38254908 未加载
hn92726819over 1 year ago
&gt; I don&#x27;t know how many disclosures I&#x27;ve done ... (100+, surely), but I have never, ever - not even once - asked for money. But Hammad isn&#x27;t me<p>I agree with everything in this post except this line. It&#x27;s nice that the author doesn&#x27;t need the money, but some people do. To me, the problem is not sharing after the answer is no, or not asking up front, not the fact someone is asking for money.
评论 #38247549 未加载
unforgivenpastaover 1 year ago
Reading the accompanying cloudpets article is very similar to my experience with reporting exploits.<p>Found a XSS vulnerability on a very popular danish website and 0 contact since reporting. The vulnerability still exists and even found a few less severe bugs
acheong08over 1 year ago
I just got my first beg bounty today about an exposed hugging face token. It was intentional and read only.
tsakover 1 year ago
After reading this HN post in the morning, I&#x27;ve received one of those SPF ~all beg bounties via email today. It ends with:<p>From: whiteboxtesting01@gmail.com<p>&gt; Waiting for your response and hoping for a bounty reward for responsibly disclosing this issue to your website. Furthermore, I may attempt to contact you again if I do not receive a response to ensure that my message has reached you.
0x53over 1 year ago
I guess I wonder about the opposite side of this. While I hate the beg bounty people as well, I don&#x27;t think security researchers should work for free. I have found several security vulnerabilities that I have never reported to the company because their security policy was basically &quot;send us everything you found for free and we won&#x27;t give you any credit&quot;.
评论 #38246617 未加载
评论 #38246662 未加载
评论 #38246579 未加载
benrockwoodover 1 year ago
I love the term, it&#x27;s appropriate. In my experience many of these beg bounties are automated and non-sensical. Script kiddies looking for a quick and easy buck. Generally when they are directed to an actual bug bounty program on HackerOne or the like they don&#x27;t follow through.
Waterluvianover 1 year ago
I’m less upset about people begging for bounties than I am learning that leaking children’s voice recordings isn’t an instant deathblow to a company.
评论 #38247038 未加载
评论 #38257923 未加载
throwaway2037over 1 year ago
A bit off topic: I am genuinely surprised that he gets to blog (regular and micro via Twitter&#x2F;X) with such a savage style. In many mega corps, even tech, they would eventually curtail this type of blogging. Steve Yegge is a pretty famous example where even Google was trying to curtail his blogging topics and style.
评论 #38252681 未加载
babuloseoover 1 year ago
I miss the old internet.
评论 #38247249 未加载
评论 #38246934 未加载
billy99kover 1 year ago
I know someone that would find security holes in random company sites and email them about it. They never asked for money.<p>Most of the time, the company sent an angry response with threats of calling the police. I always thought this was stupid.<p>I would never look for security vulnerabilities on a company site, unless I&#x27;m hired to do so. The main issue is that you have no idea if what you are doing will affect a production sites.
throwaway231113over 1 year ago
Throwaway account for obvious reasons. I&#x27;ve been employed as a triager on two primary bug bounty platforms for over seven years. The circumstances are distressing and carry tangible real-life consequences. I&#x27;m open to answering questions within my personal comfort zone.
评论 #38248750 未加载
scolby33over 1 year ago
Why is most of the substance of this post giant block quote links to his own Twitter? Clicking through to those is painful; it’s not like the author can’t afford to host some screenshots on his own domain.
gitgudover 1 year ago
Surely &quot;false positives&quot; for security vulnerabilities are better than no emails at all...<p><pre><code> &quot;If you put an email on a website, you will get spam&quot; </code></pre> <i>- A fundamental law of the internet</i>
gloyoyoover 1 year ago
Very informative.
oliwarnerover 1 year ago
I understand the problem, beggars add noise to an important contact signal point…<p>But this idea that people &#x27;<i>did</i> actually already do the &quot;work&quot; for free&#x27; so don&#x27;t deserve remuneration… isn&#x27;t great.<p>Lot&#x27;s of people do <i>spec work</i> to try and get paid, or to get more work. The recipient is free to negotiate, rebuff or simply ignore it, but this idea that time sunk is valueless is unhelpful.<p>Not defending &quot;Hammad&quot; here. If you do spec security work you <i>need</i> to lead with what you&#x27;ve got, even if that&#x27;s just a rough CVE severity rating, and your price. But I think I&#x27;d rather have people checking my configuration and taxing me for my errors than not to know at all.
评论 #38249496 未加载