TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The easiest bug bounties I have won

145 pointsby franjkovicalmost 10 years ago

6 comments

joostersalmost 10 years ago
Doesn&#x27;t this show just how crappy the backend permissions must be in Facebook&#x27;s code? Every new page needs to get the permissions checks exactly right, otherwise... Disaster. As an analogy, It&#x27;s like the most stupidly-designed UNIX system, where each user program that opens a file runs as root and must remember to do a permissions check when opening a file, rather than centralising the permissions system in the kernel.<p>No-one would accept such a shoddy design in an OS, yet in today&#x27;s web apps it is apparently standard practice...
评论 #9879487 未加载
评论 #9876923 未加载
评论 #9878318 未加载
评论 #9876910 未加载
评论 #9879039 未加载
评论 #9879083 未加载
kccqzyalmost 10 years ago
It is quite saddening that there is a recent trend of hiding the complete URL from the user when the URL itself conveys much information. When the URL is hidden the user is not given the incentive to look at the URL, let alone modify it. This kind of bug should have been discovered much sooner when the user is given the opportunity to directly look at the URL and experiment with it.
评论 #9878193 未加载
评论 #9879939 未加载
dmixalmost 10 years ago
Mobile would be great for taking this kind of approach to bug hunting.<p>Especially since Android just launched a (proper) bug bounty program [0]. A ton of old problems are new again on Android, especially due to the fact a significant percentage of the OS stuff is being re-implemented in Java (IPC, sandboxing, etc). The more I dig into it the more I&#x27;m convinced very few people are conducting serious security reviews outside of Google.<p>Take this bug as an example: <a href="http:&#x2F;&#x2F;seclists.org&#x2F;fulldisclosure&#x2F;2014&#x2F;Nov&#x2F;81" rel="nofollow">http:&#x2F;&#x2F;seclists.org&#x2F;fulldisclosure&#x2F;2014&#x2F;Nov&#x2F;81</a> An apk with system privileges (the settings app) would accept IPC messages from any unprivileged app and relay them with system privileges.<p>[0] <a href="http:&#x2F;&#x2F;techcrunch.com&#x2F;2015&#x2F;06&#x2F;16&#x2F;google-launches-bug-bounty-program-for-android-with-rewards-up-to-8000&#x2F;" rel="nofollow">http:&#x2F;&#x2F;techcrunch.com&#x2F;2015&#x2F;06&#x2F;16&#x2F;google-launches-bug-bounty-...</a>
Retr0spectrumalmost 10 years ago
I&#x27;ve been wanting to start doing bug bounties for a while now, but I have only been able to find serious bugs in sites <i>without</i> bug bounty schemes. I was starting to think that it would be impossible to get any bug bounties because of the number of people searching, but this post gives me some confidence.
评论 #9877940 未加载
评论 #9881414 未加载
r3blalmost 10 years ago
Been following your work for years now and I think that this is actually the first bug I fully understand.
colinbartlettalmost 10 years ago
Can anyone comment on when is a good time to start a bug bounty program?<p>I have some clients with relatively small scale (small budget) projects. Is it better to post a bounty program on HackerOne? Or force them to budget to hire a security researcher consultant for a day to find high-level issues? Or both?
评论 #9878919 未加载