I get request for tips for getting started in bounty hunting- so I group an answer here. This is what have worked for me and my primary focus is on Windows and filesystems. An area that I think is underrated as there is explosion in minifilters that have to all interact securely
-
-
There is new exploit class I call "trusting what is learnt under impersonation"- when a service do actions based on things learned under impersonation- like read a .config file. If read under impersonation and instructs it to load a dll- it is exploitable. You can find those
Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
"Forget assumptions, verify" is very good advice for anyone who goes into infosec thinking implementations (even by multinational billion dollar corporations) are competent.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.