quarta-feira, 31 de maio de 2023

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

Related links


  1. New Hack Tools
  2. Hacker Tools 2020
  3. Hacker Tools 2020
  4. Hacker Tool Kit
  5. Tools 4 Hack
  6. How To Hack
  7. Termux Hacking Tools 2019
  8. Pentest Tools Find Subdomains
  9. Hacking Tools Hardware
  10. Pentest Automation Tools
  11. Hacker Techniques Tools And Incident Handling
  12. What Is Hacking Tools
  13. Hack Rom Tools
  14. Hacking Tools For Pc
  15. Hacking Tools 2020
  16. Pentest Tools Open Source
  17. Pentest Automation Tools
  18. Pentest Tools Online
  19. Hack Tools
  20. Free Pentest Tools For Windows
  21. Hacker Security Tools
  22. Hacker Security Tools
  23. Hacker Tools Mac
  24. How To Install Pentest Tools In Ubuntu
  25. Hack Tools For Mac
  26. Hacker Tools For Pc
  27. Pentest Tools Windows
  28. Wifi Hacker Tools For Windows
  29. Pentest Recon Tools
  30. New Hacker Tools
  31. Hacker Tools List
  32. Hacking Tools 2020
  33. Growth Hacker Tools
  34. Hacker Tools Apk
  35. How To Make Hacking Tools
  36. Hacker Tools For Windows
  37. Pentest Tools Review
  38. Pentest Tools Review
  39. Hacking Tools And Software
  40. Hacker Tools For Mac
  41. Pentest Tools Port Scanner
  42. Hack Rom Tools
  43. Pentest Tools Alternative
  44. Pentest Tools Linux
  45. Hacking App
  46. Pentest Tools Review
  47. Pentest Tools Linux
  48. Hacker Tools Hardware
  49. Growth Hacker Tools
  50. Hack Tools For Pc
  51. Hacker
  52. Hack Tools Download
  53. Hacker Tools Online
  54. Hacker Tools Free
  55. Wifi Hacker Tools For Windows
  56. Pentest Tools Android
  57. Hacker Tools Github
  58. Hacker Tools Apk Download
  59. Top Pentest Tools
  60. Pentest Box Tools Download
  61. Hacking App
  62. Beginner Hacker Tools
  63. Hack Tool Apk No Root
  64. Growth Hacker Tools
  65. How To Hack
  66. Hack Tools Github
  67. How To Install Pentest Tools In Ubuntu
  68. How To Install Pentest Tools In Ubuntu
  69. Pentest Tools Url Fuzzer
  70. How To Hack
  71. Hack Tools 2019
  72. Hacker Tools Hardware
  73. Hacker Tools Linux
  74. Pentest Tools For Ubuntu
  75. Github Hacking Tools
  76. Hack Website Online Tool
  77. Hacker Tools
  78. Hacking Tools 2020
  79. Pentest Tools Framework
  80. Bluetooth Hacking Tools Kali
  81. Pentest Tools Alternative
  82. Pentest Tools Android
  83. Hacking App
  84. Tools Used For Hacking
  85. Pentest Tools For Windows
  86. Hacking Tools And Software
  87. Hack Tools Github
  88. How To Make Hacking Tools
  89. Nsa Hack Tools
  90. Pentest Tools Tcp Port Scanner
  91. Hacking Tools Download
  92. Blackhat Hacker Tools
  93. Hack Tool Apk
  94. Hack Tools For Mac
  95. Pentest Tools Linux
  96. New Hack Tools
  97. Hack Tools For Ubuntu
  98. Hak5 Tools
  99. Hacker Tools Github
  100. Pentest Tools Kali Linux
  101. How To Hack
  102. Hack Rom Tools
  103. Hacker Tools 2019
  104. Pentest Tools Port Scanner
  105. Hacker Tools Free Download
  106. Pentest Tools Online
  107. Hacker Tools For Pc
  108. Hacking Tools For Windows
  109. Hacking Tools For Games
  110. Hacking Tools For Windows Free Download
  111. Pentest Tools
  112. Pentest Tools Free
  113. Hak5 Tools
  114. Underground Hacker Sites
  115. Termux Hacking Tools 2019
  116. Blackhat Hacker Tools
  117. Hacker Tools 2019
  118. Hacker Tools Software
  119. Hacker Tool Kit
  120. Hacking Tools Hardware
  121. Free Pentest Tools For Windows
  122. Pentest Tools Website
  123. Pentest Tools List
  124. Pentest Automation Tools
  125. Hacking Tools
  126. Pentest Tools Kali Linux
  127. Nsa Hack Tools Download
  128. Hack Tool Apk
  129. Pentest Tools Website Vulnerability
  130. Hacker Tools For Windows
  131. Install Pentest Tools Ubuntu
  132. Hacker Tools Free
  133. Pentest Tools Subdomain
  134. Hack Tools For Windows

$$$ Bug Bounty $$$

What is Bug Bounty ?



A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.




Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.


Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1.  In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.


While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.
Related news

  1. Hacking Tools 2019
  2. Pentest Recon Tools
  3. Hacking Apps
  4. Hacker Tools Linux
  5. Pentest Tools Port Scanner
  6. Hack Tools For Pc
  7. Hacker Tools 2020
  8. Pentest Tools Android
  9. Hacker Tools Linux
  10. Hacking Tools Github
  11. Underground Hacker Sites
  12. Nsa Hack Tools Download
  13. Pentest Tools Github
  14. Pentest Tools Nmap
  15. Termux Hacking Tools 2019
  16. Pentest Tools Url Fuzzer
  17. Hacking Tools Software
  18. Hak5 Tools
  19. Pentest Recon Tools
  20. Hack Tools Online
  21. Pentest Tools Download
  22. Tools For Hacker
  23. Pentest Tools For Android
  24. Hacker Tools Free
  25. Hack Tools Github
  26. Hacking Tools Online
  27. Pentest Tools Alternative
  28. Hacker Security Tools
  29. Hack Tool Apk No Root
  30. Hacker Tools Hardware
  31. Install Pentest Tools Ubuntu
  32. Hacking Tools Hardware
  33. Best Pentesting Tools 2018
  34. Hacker Tool Kit
  35. Hacker Security Tools
  36. Hacking Tools Github
  37. Hack Tools
  38. Beginner Hacker Tools
  39. Hak5 Tools
  40. Hack Tools Online
  41. Hacking Tools Kit
  42. Hacker Tools Hardware
  43. Top Pentest Tools
  44. Game Hacking
  45. Hacker Tools List
  46. Pentest Tools Android
  47. Pentest Tools Bluekeep
  48. Best Hacking Tools 2020
  49. Hacking Tools For Windows Free Download
  50. Hacking Tools Windows
  51. Hacking Tools 2020
  52. Nsa Hacker Tools
  53. Hacking Tools For Games
  54. Hacker Tools Apk Download
  55. Hacker Tools
  56. Hack Tools Pc
  57. Best Hacking Tools 2019
  58. Pentest Tools Android
  59. Hacks And Tools
  60. Hack Tool Apk No Root
  61. Hacking Tools Name
  62. Hacking Tools And Software
  63. Hacker Security Tools
  64. Pentest Tools Github
  65. Pentest Tools Find Subdomains

Top Users Command In Linux Operating System With Descriptive Definitions


Linux is a command line interface and has a graphical interface as well. But the only thing we should know how we interact with Linux tools and applications with the help of command line. This is the basic thing of Linux.  As you can do things manually by simple clicking over the programs just like windows to open an applications. But if you don't have any idea about commands of Linux and definitely you also don't know about the Linux terminal. You cannot explore Linux deeply. Because terminal is the brain of the Linux and you can do everything by using Linux terminal in any Linux distribution. So, if you wanna work over the Linux distro then you should know about the commands as well.
In this blog you will get a content about commands of Linux which are collectively related to the system users. That means if you wanna know any kind of information about the users of the system like username passwords and many more.

id

The "id" command is used in Linux operating system for the sake of getting knowledge about active user id with login and group. There may be different users and you wanna get a particular id of the user who is active at that time so for this you just have to type this command over the terminal.

last

The "last" command is used in Linux operating system to show the information about the last logins on the system. If you forget by which user id you have logged in at last time. So for this information you can search login detail by using this command.

who

The "who" command is used in Linux distributions to display the information about the current user which a an active profile over the Linux operating system. If you are in the system and you don't know about that active user and suddenly you have to know about that user detail so you can get the info by using this command.

groupadd

The "groupadd admin" is the command which is used in Linux operating system to add a group in the Linux system to gave the privileges to that group.

useradd

The "useradd" command is used in Linux operating system to add user or users to a specific group. If you wanna add a user name Umer so for this matter you just have to write a command i.e. useradd -c "Umer".

userdel

The "userdel" command is used in Linux operating system for the purpose to delete any user or users from the particular group present in the linux operating system. For example "userdel Umer" this command will delete the user named Umer.

adduser

The "adduser" command is a simple command used to create directly any user in the system. There is no need to make a group for this. You just have to type the command with user name like adduser Umer, it will created a user by name Umer.

usermod

The "usermod" is a command used in Linux operating system to modify the information of any particular user. You can edit or delete information of any particular user in the Linux operating system.


Related posts


terça-feira, 30 de maio de 2023

How To Spoof PDF Signatures

One year ago, we received a contract as a PDF file. It was digitally signed. We looked at the document - ignoring the "certificate is not trusted" warning shown by the viewer - and asked ourselfs:

"How do PDF signatures exactly work?"

We are quite familiar with the security of message formats like XML and JSON. But nobody had an idea, how PDFs really work. So we started our research journey.

Today, we are happy to announce our results. In this blog post, we give an overview how PDF signatures work and on top, we reveal three novel attack classes for spoofing a digitally signed PDF document. We present our evaluation of 22 different PDF viewers and show 21 of them to be vulnerable. We additionally evaluated 8 online validation services and found 6 to be vulnerable.

In cooperation with the BSI-CERT, we contacted all vendors, provided proof-of-concept exploits, and helped them to fix the issues and three generic CVEs for each attack class were issued: CVE-2018-16042CVE-2018-18688CVE-2018-18689.


Full results are available in the master thesis of Karsten Meyer zu Selhausen, in our security report, and on our website.

Digitally Signed PDFs? Who the Hell uses this?

Maybe you asked yourself, if signed PDFs are important and who uses them.
In fact, you may have already used them.
Have you ever opened an Invoice by companies such as Amazon, Sixt, or Decathlon?
These PDFs are digitally signed and protected against modifications.
In fact, PDF signatures are widely deployed in our world. In 2000, President Bill Clinton enacted a federal law facilitating the use of electronic and digital signatures in interstate and foreign commerce by ensuring the validity and legal effect of contracts. He approved the eSign Act by digitally signing it.
Since 2014, organizations delivering public digital services in an EU member state are required to support digitally signed documents, which are even admissible as evidence in legal proceedings.
In Austria, every governmental authority digitally signs any official document [§19]. In addition, any new law is legally valid after its announcement within a digitally signed PDF.
Several countries like Brazil, Canada, the Russian Federation, and Japan also use and accept digitally signed documents.
According to Adobe Sign, the company processed 8 billion electronic and digital signatures in the 2017 alone.

Crash Course: PDF and PDF Signatures

To understand how to spoof PDF Signatures, we unfortunately need to explain the basics first. So here is a breef overview.

PDF files are ASCII files. You can use a common text editor to open them and read the source code.

PDF header. The header is the first line within a PDF and defines the interpreter version to be used. The provided example uses version PDF 1.7. 
PDF body. The body defines the content of the PDF and contains text blocks, fonts, images, and metadata regarding the file itself. The main building blocks within the body are objects. Each object starts with an object number followed by a generation number. The generation number should be incremented if additional changes are made to the object.
In the given example, the Body contains four objects: Catalog, Pages, Page, and stream. The Catalog object is the root object of the PDF file. It defines the document structure and can additionally declare access permissions. The Catalog refers to a Pages object which defines the number of the pages and a reference to each Page object (e.g., text columns). The Page object contains information how to build a single page. In the given example, it only contains a single string object "Hello World!".
Xref table. The Xref table contains information about the position (byte offset) of all PDF objects within the file.
Trailer. After a PDF file is read into memory, it is processed from the end to the beginning. By this means, the Trailer is the first processed content of a PDF file. It contains references to the Catalog and the Xref table.

How do PDF Signatures work?

PDF Signatures rely on a feature of the PDF specification called incremental saving (also known as incremental update), allowing the modification of a PDF file without changing the previous content.
 
As you can see in the figure on the left side, the original document is the same document as the one described above. By signing the document, an incremental saving is applied and the following content is added: a new Catalog, a Signature object, a new Xref table referencing the new object(s), and a new Trailer. The new Catalog extends the old one by adding a reference to the Signature object. The Signature object (5 0 obj) contains information regarding the applied cryptographic algorithms for hashing and signing the document. It additionally includes a Contents parameter containing a hex-encoded PKCS7 blob, which holds the certificates as well as the signature value created with the private key corresponding to the public key stored in the certificate. The ByteRange parameter defines which bytes of the PDF file are used as the hash input for the signature calculation and defines 2 integer tuples: 
a, b : Beginning at byte offset a, the following b bytes are used as the first input for the hash calculation. Typically, a 0 is used to indicate that the beginning of the file is used while a b is the byte offset where the PKCS#7 blob begins.
c, d : Typically, byte offset c is the end of the PKCS#7 blob, while c d points to the last byte range of the PDF file and is used as the second input to the hash calculation.
According to the specification, it is recommended to sign the whole file except for the PKCS#7 blob (located in the range between a b and c).

Attacks

During our research, we discovered three novel attack classes on PDF signatures:

  1. Universal Signature Forgery (USF)
  2. Incremental Saving Attack (ISA)
  3. Signature Wrapping Attack (SWA)

In this blog post, we give an overview on the attacks without going into technical details. If you are more interested, just take a look at the sources we summarized for you here.

Universal Signature Forgery (USF)

The main idea of Universal Signature Forgery (USF) is to manipulate the meta information in the signature in such a way that the targeted viewer application opens the PDF file, finds the signature, but is unable to find all necessary data for its validation.

Instead of treating the missing information as an error, it shows that the contained signature is valid. For example, the attacker can manipulate the Contents or ByteRange values within the Signature object. The manipulation of these entries is reasoned by the fact that we either remove the signature value or the information stating which content is signed.
The attack seems trivial, but even very good implementations like Adobe Reader DC preventing all other attacks were susceptible against USF.

Incremental Saving Attack (ISA)



The Incremental Saving Attack (ISA) abuses a legitimate feature of the PDF specification, which allows to update a PDF file by appending the changes. The feature is used, for example, to store PDF annotations, or to add new pages while editing the file.

The main idea of the ISA is to use the same technique for changing elements, such as texts, or whole pages included in the signed PDF file to what the attacker desires.
In other words, an attacker can redefine the document's structure and content using the Body Updates part. The digital signature within the PDF file protects precisely the part of the file defined in the ByteRange. Since the incremental saving appends the Body Updates to the end of the file, it is not part of the defined ByteRange and thus not part of the signature's integrity protection. Summarized, the signature remains valid, while the Body Updates changed the displayed content.
This is not forbidden by the PDF specification, but the signature validation should indicate that the document has been altered after signing.

Signature Wrapping Attack (SWA)

Independently of the PDFs, the main idea behind Signature Wrapping Attacks is to force the verification logic to process different data than the application logic.

In PDF files, SWA targets the signature validation logic by relocating the originally signed content to a different position within the document and inserting new content at the allocated position. The starting point for the attack is the manipulation of the ByteRange value allowing to shift the signed content to different loctions within the file.

On a very technical level, the attacker uses a validly signed document (shown on the left side) and proceeds as follows:


  • Step 1 (optional): The attacker deletes the padded zero Bytes within the Contents parameter to increase the available space for injecting manipulated objects.
  • Step 2: The attacker defines a new /ByteRange [a b c* d] by manipulating the c value, which now points to the second signed part placed on a different position within the document.
  • Step 3: The attacker creates a new Xref table pointing to the new objects. It is essential that the byte offset of the newly inserted Xref table has the same byte offset as the previous Xref table. The position is not changeable since it is refer- enced by the signed Trailer. For this purpose, the attacker can add a padding block (e.g., using whitespaces) before the new Xref table to fill the unused space.
  • Step 4: The attacker injects malicious objects which are not protected by the signature. There are different injection points for these objects. They can be placed before or after the malicious Xref table. If Step 1 is not executed, it is only possible to place them after the malicious Xref table.
  • Step 5 (optional): Some PDF viewers need a Trailer after the manipulated Xref table, otherwise they cannot open the PDF file or detect the manipulation and display a warning message. Copying the last Trailer is sufficient to bypass this limitation.
  • Step 6: The attacker moves the signed content defined by c and d at byte offset c*. Optionally, the moved content can be encapsulated within a stream object. Noteworthy is the fact that the manipulated PDF file does not end with %%EOF after the endstream. The reason why some validators throw a warning that the file was manipulated after signing is because of an %%EOF after the signed one. To bypass this requirement, the PDF file is not correctly closed. However, it will be still processed by any viewer.

Evaluation

In our evaluation, we searched for desktop applications validating digitally signed PDF files. We analyzed the security of their signature validation process against our 3 attack classes. The 22 applications fulfill these requirements. We evaluated the latest versions of the applications on all supported platforms (Windows, MacOS, and Linux).


Authors of this Post

Vladislav Mladenov
Christian Mainka
Karsten Meyer zu Selhausen
Martin Grothe
Jörg Schwenk

Acknowledgements

Many thanks to the CERT-Bund team for the great support during the responsible disclosure.
We also want to acknowledge the teams which reacted to our report and fixed the vulnerable implementations.

Read more