Bug Bounty Hunters

Where have you heard the word bounty
or may be bounty hunter? I’m positive that is from a Television show, well for
me, that was the case. Heard it in Lucifer! Anyhow in professional grounds, bounty
hunters also called bail enforcement officers, in general terms is known to be a
professional person who captures fugitives or criminals for a commission or
bounty. These types of personals work for law enforcement to lure fugitives out
from hiding and bring them to justice. But this post is not about those bounty
hunters but about a different kind of bounty hunters in cyber security sphere,
bug bounty hunters.
Ethical Hacking and Bug Bounty Hunting
A bug bounty hunter is an
individual who discovers and reports software bugs. But wait! There is a well-known
term we use for that, if you would say, and if that’s Ethical Hacking you have
in mind, I would say those are two different things. Ethical hacking is mainly penetrating
testing (Pen tests) carried out by a company specialized for that task. Pen
tests are carried out by experienced ethical hackers employed by specialist
cyber security companies. Professional ethical hackers are required to have
undertaken qualifications in cyber security. This makes sure that they have an
in-depth knowledge of the legal, technical, and ethical aspects of testing. Bug
bounty hunters on the contrary can be a mixture of both professional ethical
hackers and armatures. Mostly, students are attracted to Bug Bounty Program (BBP).
What Is A Bug Bounty Program?
A bug bounty program is a
crowdsourcing (use talents of the crowd) program offered by websites,
organizations, and software developers that rewards
individuals for discovering and reporting software bugs. In return for the bugs found, bounty hunter receives recognition
and compensation. The ultimate target here is to allow developers to remedy any
sort of bug before the general public is aware of those. Well renowned
companies like Mozilla, Google, Facebook and Microsoft have implemented Bug
Bounty Programs (BBP).
Penetration Testing VS BBP
Penetration testing as mentioned
before is a well-known and established cyber security assessment type carried
out by a company that specializes in ethical hacking. BBP help explore more in
to already well-secured platforms’ vulnerabilities and find any bug that is
left.
Fundamentally a penetrating test is differed from a BBP from the resources – people who carry out each. While pen tests are carried out by experts BBP can be carried out by a both experts and armatures.
Pen testing are usually carried out to meet specific needs of a particular client. Different types of assessments such as internal and external network testing, web application testing and wireless testing are carried out under this. BBP on the other hand is only concerned with publicly available web application testing. The scope of the testing in BBP is not so well defined.
While in terms of the duration of the testing, pen testing is carried out over a relatively shorter period, BBP does not have hard and fast deadlines as such and so is best for continuous testing with frequent release cycles.
Cost wise the pen tests usually is based on the number of days hackers need to achieve the agreed upon objectives. In most BBP platforms organizations are allowed to set the price they are prepared to pay.
Even though BBP have become popular nowadays, in terms of feedback, pen testing is better since penetration test will not only identify exposures, but will also provide the feedback and support needed to address them. Bug bounty programs are focused solely on discovering vulnerabilities and for this reason the level of feedback will generally be low.
Fundamentally a penetrating test is differed from a BBP from the resources – people who carry out each. While pen tests are carried out by experts BBP can be carried out by a both experts and armatures.
Pen testing are usually carried out to meet specific needs of a particular client. Different types of assessments such as internal and external network testing, web application testing and wireless testing are carried out under this. BBP on the other hand is only concerned with publicly available web application testing. The scope of the testing in BBP is not so well defined.
While in terms of the duration of the testing, pen testing is carried out over a relatively shorter period, BBP does not have hard and fast deadlines as such and so is best for continuous testing with frequent release cycles.
Cost wise the pen tests usually is based on the number of days hackers need to achieve the agreed upon objectives. In most BBP platforms organizations are allowed to set the price they are prepared to pay.
Even though BBP have become popular nowadays, in terms of feedback, pen testing is better since penetration test will not only identify exposures, but will also provide the feedback and support needed to address them. Bug bounty programs are focused solely on discovering vulnerabilities and for this reason the level of feedback will generally be low.
References
https://www.cyberdb.co/difference-penetration-testing-bug-bounty-programmes/
https://www.webopedia.com/TERM/B/bug-bounty-program.html
https://en.wikipedia.org/wiki/Bounty_hunter
https://internetseekho.com/how-to-become-a-bug-bounty-hunter-in-2020/
This is my first time reading on this topic. I'm a little curious about how the rewarding happens in these programs. Since armatures also carry out the testing there can be reliability issues. So, how do they reward?
ReplyDeleteIt is for the critical flaws that they are being rewarded Dulanga. If somebody finds a real, critical flaw in the software only they get a reward. This is not pre-promised or in proportion with the time someone spends finding it. This reward or the bounty can be monetary reward, or being put into a “hall of fame” list for finding the bounty, or gear from the company giving the bounty, or any combination of the above. Anyone in the world is free to scrutinize through the code of an application of an open source software and look for flaws. There are rules of course which you can find an instance of, following this link: https://ostif.org/bug-bounties-what-they-are-and-why-they-work/
DeleteAs we know allowing to conduct a pen testing or a BBP testing means exposing the business or the organization to a third party. So what kind of resources are taken from the client (business/organization) in order to conduct these two type of testing?
ReplyDeleteYes Ruvishka. That's true specially for penetrating testing compared with BBP, since BBP only websites and web applications that are publicly accessible are exposed for the hackers to find bugs. But in pen testing there are many types of assessment, ranging from internal and external network testing, to web application testing, wireless testing, and more. That's why unlike BBP, pen tests are being carried out by a company that specializes in ethical hacking. Unlike BBP, pen tests include proper planning and preparation to ensure that the pen test itself does not become a vulnerability for the company.
DeleteComprehensive writeup Pramodi. Are there any specific bug bounty hunting tool?
ReplyDeleteYes Chamal. In fact, there are plenty of tools such as HackBar, Wfuzz, IronWASP, Burp Suite, Google Dorks, and many more. For a comprehensive read on the same, please refer the following link: https://resources.infosecinstitute.com/certification/top-10-security-tools-for-bug-bounty-hunters/
DeleteNice flow pramodi, Big bounty hunting is new information for me. Thank you for making us aware with latest information.
ReplyDelete