Bug bounty research: hot or not - 13 Jul 2016
Scornhub - 26 May 2016
The meaning of life tastes like chicken - 24 Feb 2016
fucking astrology man - 09 Dec 2015
Freelance Consulting - 23 Nov 2015
The Wassenaar Effect - 09 Jun 2015
Scantastic! - 11 Feb 2015
It's all fucked - 05 Jan 2015
The tortured poet - 28 Dec 2014
Gone in 660 Seconds - 25 Nov 2014
College Graduation - 20 Nov 2014
Yahoo for the craic! - 21 Sep 2014
IRC what you did there... - 02 Aug 2014
Let me Bug you!? - 19 Jun 2014
Plesk 10 & 11 SSO XXE/XSS - 09 May 2014
Final Year Woes - 24 Apr 2014
SWMing in privilege, or drowning? - 10 Apr 2014
Lucid Surrealist Dreams and techno-lust. - 23 Mar 2014
New Raspberry piToy - 05 Feb 2014
Happy 2014! - 15 Jan 2014
Helpdesk Pilot Xss/CSRF Add an Admin - 30 Nov 2013
Squidoo.com $1,100 bug bounty - 02 Nov 2013
Yahoo Xss bug bounty - 01 Oct 2013
Moodle 2.0 Account Takeover - 04 Sep 2013
Xss Challenge Accepted - 17 Aug 2013
rpliy - rpi python web player - 25 Jul 2013
Busy times - 10 Jul 2013
Source Conference - 27 May 2013
Coinbase.com bug bounty - 04 May 2013
Xssive, Moodle and CSRF - 11 Apr 2013

Yahoo Pipes is Great! - 05 Mar 2013
Science Hack-day Dublin - 03 Mar 2013
Simple port scan - 26 Feb 2013
4chan-tool.py - 19 Feb 2013
Wix.com Xss - 11 Feb 2013
Crawl.py Url Crawling - 09 Feb 2013
Xssive Demo tool - 12 Jan 2013
Cyberbullying? - 27 Dec 2012
Merry XssMas - 24 Dec 2012
Watching BBC Streams - 10 Dec 2012
SWF Disassembly - 26 Nov 2012
C <3 - 16 Nov 2012
Greasemonkey XSS 2 - 21 Oct 2012
Work Logging App - 20 Oct 2012
Greasemonkey XSS - 30 Sep 2012
Guestbook XSS - 18 Sep 2012
OWASP Vicnum Project - 05 Sep 2012
August... - 05 Sep 2012
XSS Scenarios. - 30 Jul 2012
Imageroll - 06 Jul 2012
The Dangers of XSS - 14 Jun 2012

US Threat Gauge - 30 May 2012
Is this art? - 28 May 2012
Rss2Irc - 25 May 2012
Blackboard Xss Jungle - 14 May 2012
Url Info Scraper - 10 May 2012
pythonchallenge.com - 27 Apr 2012
Prime Generator - 15 Apr 2012
Sockso 1.51 Xss - 07 Apr 2012


Ubuntu 10.10 Hardening - 18 Mar 2012
2nd Year Revisited - 17 Mar 2012

Let me Bug you!?

The last few weeks have been fun, I've had a few small bugs fixed here and there as part of a few different bug bounty programs. I've also crawled up a few places in the bugcrowd.com leaderboards. I do intend on keeping this up as a hobby!

To further compliment my massive interest in the security field, I've also just started in a consulting role with Rits information Security. I'm very excited about working, I hopefully have something to offer in this area and I hope my enthusiasm to learn helps me excel in this field of work. I feel so very privileged to be working on something I'm so passionate about.

I've had an interesting month with regards to bug bounties. Since the beginning of the month, I've got confirmed bug bounty bugs for Yahoo, Facebook, Microsoft and Kayako. I should hopefully be included in the Facebook/Microsoft responsible disclosure acknowledgement pages within the next month for my reported issues. I also had a good bit of success with some of the bugcrowd.com and hackerone.com ran bounty programs.

I suppose I better share some of my findings -_-, below you will see two proof of concept videos I used when demonstrating two of the XSS bugs I found for kayako and yahoo respectively. These are just very simple issues, and as XSS is so common, I don't think you'll be surprised to see me posting more to my blog. These are still a majority of the issues I come across. I reported a few more of these to yahoo and microsoft. I think the main reason I tend to focus on them is because of the abundance of them and also because I have had severely limited testing time as a result of college work.

On facebook I found an information disclosure issue in which a django app debug information was accessible from a public facing dev server. Within which various internal network addresses and configuration settings was exposed. I don't believe in sharing information disclosure bugs publicly. I think it defeats the purpose of helping a company hide the information that was disclosed by the bug. So for an example of this, posting an image of an /etc/passwd file without hiding the user login entries is a little silly. I've seen this plenty of times on various blog posts of bug reports.

I did also get a nice thank you message from house.gov for reporting an SQL injection I accidentally stumbled across. (It was actually an accident). Some would say that was a stupid move and borderline illegal. My reason for reporting this was out of fear that some other malicious party would find and abuse this bug and I'd be blamed once they go and root through their logs.

I'm leaving now to await my degree results and see how I did in my project. Hopefully you find my month as interesting as I did. Later homes.