Episode 69: Johan Carlsson - 3 Month Check-in on Full-time Bug Bounty.
May 2, 2024
auto_awesome
Johan Carlsson, a dedicated bug bounty hunter, shares his journey transitioning to full-time bug hunting. He discusses the thrill of discovering vulnerabilities like a CSP bypass in GitHub and a critical flaw in GitLab. Johan highlights his focus on complex bug types like ReDoS and OAuth, emphasizing the unpredictability that accompanies bug hunting. He also offers insights into balancing personal life with his bug bounty career, navigating financial challenges, and the importance of community support in this unique profession.
Johan Carlsson discusses his transition to full-time bug bounty hunting, emphasizing the blend of previous technical skills and newfound security focus.
He shares insights on identifying complex vulnerabilities, particularly a CSP bypass, highlighting the importance of understanding security policies in web applications.
Carlsson reflects on managing the financial aspects of bug hunting while balancing work and personal life, stressing the need for structured routines and clear income strategies.
Deep dives
Introduction to CSP Evaluator and Tools
The episode discusses the CSP Evaluator, a tool aimed at assessing the security posture of Content Security Policies. New features in Nuclei 3.2, particularly for authenticated scanning and advanced fuzzing support, are highlighted. Authenticated scanning streamlines the process by automatically managing login templates, which enhances coverage for penetration testing. Advanced fuzzing expands the potential to identify vulnerabilities by allowing fuzzing within various data structures, headers, and cookies.
Journey into Full-time Bug Bounty
The podcast features a guest, Johan Carlson, who shares his transition into full-time bug bounty hunting, citing his previous technical background. After years away from tech, he returned to the field to focus on security and began his bug bounty journey alongside gaining professional experience in web development. His path included academic work, which inadvertently led him into the world of bug bounties, eventually evolving into a full-time commitment. He discusses the challenges and rewards of immersing himself fully in this field.
Exploration of Complex Bugs
A significant focus of the episode is Johan's experience in discovering intricate vulnerabilities, particularly a CSP bypass in a dense environment. He describes how he utilized a discovered HTML injection point and navigated through Content Security Policies to leverage an exploit within a controlled setting. Johan emphasizes the importance of understanding CSP directives, specifically noting how form actions can be misconfigured. This highlights the necessity of careful attention to detail when evaluating security policies in web applications.
User Interaction as an Exploitation Mechanism
Johan explains employing user interaction to facilitate his exploit, particularly through techniques like drag-and-drop functionality combined with Turbo Streams. By creatively manipulating the structure of the web application’s forms, he was able to set up a complex series of actions that resulted in executing unauthorized operations. This method underlines the potential of combining frontend frameworks with traditional exploitation tactics to execute successful attacks. His method showcases both the creative and technical skills necessary within the realm of web security.
Income and Financial Management in Bug Bounty
Johan discusses the financial implications of working full-time in bug bounty, focusing on strategies for managing income and sustaining his lifestyle. He emphasizes the significance of knowing the timing of payouts, as many programs may take months to process submissions. By creating a clear financial outlook through spreadsheets summarizing potential earnings and tracking submissions, he is better equipped to navigate the financially fluctuating landscape of bug hunting. This structured approach allows him to maintain a sense of control and reduce stress associated with unforeseen financial challenges.
Balancing Work-Life Dynamics
The conversation shifts to the dynamics of balancing work and personal life, particularly in a self-directed role like bug bounty hunting. Johan reflects on the difficulty of distinguishing between work time and family time in a home environment. He acknowledges the need for routines and set work hours to cultivate productivity while being present for his family. Maintaining this balance is essential for sustaining both professional success and personal well-being, especially for those who work independently and manage their schedules.
Episode 69: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Johan Carlsson to hear about some updates on his bug hunting journey. We deep-dive a CSP bypass he found in GitHub, a critical he found in GitLab's pipeline, and also talk through his approach to using script gadgets and adapting to highly CSP'd environments. Then we talk about his transition to full-time bug hunting, including the goals he’s set, the successes and challenges, and his current focus on specific bug types like ReDoS and OAuth, and the serendipitous nature of bug hunting.
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Sign up for Caido using the referral code CTBBPODCAST for a 10% discount.