09.21.2020
Events

H1-2010 Bonuses

Keyboard

During this event, we will have a few bonuses up for grabs in each round of the event. Read on to learn how you can earn them!

Hacker of the Day

Each day, around 5pm ET, a tweet from @theparanoids will announce the Hacker of the Day!

The Hacker of the Day will be chosen daily based on report impact, report write up quality, and positive contributions to the community. The winner will be notified beforehand allowing an opportunity to provide their Twitter handle for inclusion in the tweet (optional).

Best Report

What does Verizon Media look for in a good report?

An extra few minutes on a report can potentially save you hours once it has been submitted. Remember, the issue may be clear to you, but if it cannot be replicated with easy to follow instructions you will likely receive this status change:

At this point, you may have to rewrite your whole report again - when this time could have been spent looking for another vulnerability aka $$. Take a moment to review with us the key components of a good report.

 

Assets

Verizon Media has a large presence on the internet. Select the asset that aligns as closely as possible with where you found your vulnerability.

Weakness

Select the weakness that best describes your vulnerability. You may refer to the program policy page for a lookup table of common vulnerability names and the CWE that we usually associate with it.
 

Severity

While optional, this part of the report is usually the most contentious as it directly correlates to a potential bounty award. Try and be as honest as possible with yourself and us. Marking a report as critical all the time does not work in your favor and it does not help you jump the queue. We read every report with fresh eyes, but if you have trained us to expect that your severity is wrong, it may be hard to change that perception.

It should be noted that Verizon Media will make the final determination on impact. At times we have reduced severity and provided an explanation as to why and other times we have increased the impact after further internal investigation.

Proof of Concept

Title

It’s a simple field, but can be an effective tool in drawing attention to your report. The title is displayed within H1 email submission reports and within the H1 inbox. This is a good chance to roll together the asset, attack, and result into one line.

Example: "UnAuthenticated Boolean Based SQLi - foo.bar.media.yahoo.com"

Summary

Start with a one paragraph description of your report. This is the first text we read - is it enough to convince us you found an issue? Some additional items to include within the summary are:

  • Affected Property / Application
  • URL / Domain
  • Vulnerable Parameters
  • If you stumble across Verizon Media documentation that states one thing and your vulnerability proves otherwise - paste the link into the summary and show an extract
  • A summary of the impact is also very useful

Steps To Reproduce

If this section is not clear in your report, expect the status icon (purple) on the report to turn to light blue (bad) instead of going orange (good).

Below are some simple considerations:

  • If the vulnerability requires authentication, share your testing credentials within the report
  • Break the vulnerability out into Steps; “Step (1): [details], Step (2): [details]”
  • If each step requires a GET, POST, PATCH, or PUT request, paste the actual raw text of the request into the report - do not solely provide a screenshot. A screenshot can be provided to accompany the actual request. The screenshot allows the triager to confirm that the request is correct, see the response and ensure that each step to reproduce the vulnerability is working as described in your report
  • Where ever possible, provide a curl command. Burp has a built in feature to do this: right-click on any request and select “Copy as curl command” from the menu; see the screenshot for an example

  • If you are able to script an exploit for the issue, this is a great value-add. For example - POC.py
  • When hosting remote files (HTML / SVG / PHP) etc, paste the code into your report so Triage can create their own POC’s on their own servers.
  • Consider including a POC video; these are useful for a number of reasons. (1) it shows the vulnerability working at that given time (2) in multi-step reports, it can clearly show the whole process through to the final exploitation
  • Always include poc scripts, screenshots, videos within the H1 report. Never upload anywhere else.

Some of the best reports we have seen also include a detailed explanation of how the hacker came to testing this specific thing, and why they tried this type of attack in that place. 

 



 

Hopefully this overview is useful to level up your report writing skills. We certainly hope so! 

Happy hacking,

The Paranoids

  • Advertise with us
  • Find the right advertising solutions for your business.
  • Join us
  • Spend every day connecting people with the things they love.
  • Follow us
© 2020 Verizon Media. All Rights Reserved