Logo

dev-resources.site

for different kinds of informations.

Bug bounty hunting with LLMs

Published at
8/16/2024
Categories
bugbounty
security
ai
programming
Author
vkili
Categories
4 categories in total
bugbounty
open
security
open
ai
open
programming
open
Author
5 person written this
vkili
open
Bug bounty hunting with LLMs

I haven't been bug bounty hunting for a while now, but recently, I've been trying to get back into the game. I thought it'll be easy to dive right back in --- but bug bounty hunting is definitely getting harder. Compared to a few years ago, secure development practices have become more common, and WAFs are now ubiquitous. These are really exciting wins for security professionals, but theyā€™ve definitely made life harder as a bug bounty hunter! Looking for bugs was never straightforward, but this time around, I really feel the need to up-skill.

To keep things fun (and to compensate for my rusty web hacking skills), Iā€™ve decided to implement new workflows and hopefully learn some new things in the process. One of the approaches Iā€™ve started using is integrating LLMs to help investigate potential security issues in web apps.

LLM-based applications have already become an integral part of my software development workflow. I use ChatGPT to write scripts, understand other people's code, and leverage Copilot for more complex development tasks.

But similar processes can also be applied to security research. For open-source bug bounty programs, LLMs make it really easy to understand large codebases. For example, you can ask: Which components process user input? Where does user input enter this application? And so on.

If the source code isnā€™t available for an application, you can ask questions like: How is this functionality usually implemented? How does this usually work in this framework? As more organizations use AI tools like Copilot in their development processes, you can even ask Copilot to recreate an applicationā€™s functionality and go from there. Then, you can ask GPT for investigation ideas and write scripts to automate parts of your recon.

I donā€™t think LLMs can help automate too much of bug bounty hunting yet. Many bugs will still need to be found and confirmed manually ā€”--logic issues, information leaks, privacy concerns. But they are pretty useful for learning and researching new areas of security.

Helpful prompts

Learning

What are some common security issues that affect applications of this type?
How is this functionality usually implemented?
What are the consequences of X bug?
Are there any privacy or info leak concerns for an application that does this?
What are some other security issues that tend to affect this functionality?

Hunting

How does X usually work in this framework?
How does this framework process user input?
What are indicators that an app is affected by X bug?
What is the impact of X bug? How does an attacker exploit this bug?
How does X bug cause info leak / session hijacking / other unintended consequences?
Write me a script to do X.
What are some common defenses against X? What are indicators that they are in place?


Thanks for reading! Want to connect? Feel free to reach out on https://x.com/vickieli7.

bugbounty Article's
30 articles in total
Favicon
怐Activities Guide怑A detailed overview of the TECNO Security Response Center's security incentive activities
Favicon
Master Password Attacks in Minutes! Ethical Hacking Guide šŸ”“
Favicon
How to Set Up an Access Point with a Fake Captive Portal
Favicon
Some handy notes for GCP pentesting
Favicon
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon
Favicon
Top 5 Vulnerabilities Youā€™re Missing Out On (And How to Catch Them)
Favicon
The Unspoken Path to Effective Bug Hunting: A Guide Beyond Tools and Techniques
Favicon
Top Hacking Books for 2024 (plus Resources): FREE and Paid
Favicon
Bug bounty hunting with LLMs
Favicon
External vs. Internal Explained
Favicon
Bug Bounty Report Template
Favicon
Docker explained for pentesters
Favicon
A07:2021 ā€“ Identification and Authentication Failures
Favicon
what is BOUNTY BUG ?
Favicon
Cara Menginstal DVWS (Damn Vulnerable Web Services) di Nginx
Favicon
Details QA should share when reporting a bug for efficient resolution
Favicon
Treating the IRS Tax Code as Actual Code: The Rise of Tax Hackers
Favicon
Top 5 open-source bug reporting tools for web developers
Favicon
The Role of Bug Reporting in Software Testing: A Deep Dive
Favicon
10 Best Bug Bounty Platforms to Earn Money Online
Favicon
Rapyd Launches Bug Bounty Program: Earn Rewards for Finding Security Vulnerabilities
Favicon
How to Get Started with Bug Bounty?
Favicon
$350 XSS in 15 minutes
Favicon
The Best Ways to Exploit Rate Limit Vulnerabilities
Favicon
A Brief Introduction to SAML Security Vector
Favicon
A Summary of Fuzzing Tools and Dictionaries For Bug Bounty Hunters
Favicon
P1 Bug Bounties: What is an IDOR, and how does IDOR == $$$?
Favicon
An Open Source apps Leads to XSS to RCE Vulnerability Flaws
Favicon
How To Exploit PHP Remotely To Bypass Filters & WAF Rules
Favicon
The Various Utilization Methods of PHP Serialization & Deserialization

Featured ones: