News

Published on July 12th, 2019 📆 | 8348 Views ⚑

0

HackerOne breaks down the top 10 cybersecurity vulnerabilities


https://www.ispeech.org

When it comes to bug bounty companies, HackerOne stands apart as a premiere company for ethical hacking. Founded in 2012, the company has become the leader for companies who want to test their vulnerabilities and for ethical hackers who want to make a little extra cash.

With this position in the market, they have particularly unique insights into trends in cybersecurity.

In 2019, what are the vulnerabilities that a business person needs to think about when running a company?

Here is the top-10 list according to HackerOne.

Plus, at the end we will give you a list of the best companies for bounty programmes 😉 .

 

1. Cross-site Scripting

 

This one should be obvious because it is also the most common form of hacking. Cross-site scripting can be especially problematic for a company because it affects the users. Typically a hacker will inject a script on the user side that injects itself into the visitor’s session.

For example, if you have a company that creates profiles, a hacker can run a script on their own page and whenever someone visits their profile it steals their personal information.

 

2. Improper Authentication

 

The most famous example of an improper authentication hack happened to Uber in 2017. What happened was a hacker discovered a bug that allowed anyone with an email account (and the skills) to reset other people’s passwords.

Then, the token was made public which allowed the hacker to reset other people’s password (which the person would clearly know and could gain access to the account). This is extremely problematic for companies that store financial information.

 

3. Information Disclosure

 

Information disclosure the most famous case of hacking because it makes the news whenever a major case occurs. The most notable example was when Equifax was hacked in 2017. 143 million users has their social security and drivers license numbers stolen (a few had their credit card information swiped).

In the US, if a criminal has a social security number, they can open fraudulent credit cards and charge a lot of money to victims.

 

4. Privilege Escalation

 

Hackers can take advantage of design flaws to gain access to parts of software that might be restricted. For a subscription business this means opportunity costs, but for a major corporation it can cause real havoc.

Imagine having a hacker gain access to the HR admin page of the corporate backend? Android phones are particularly vulnerable to privilege escalation and Google spends a lot of energy combating it.

 

5. SQL Injection

 

SQL Injection can be potentially devastating to a corporate database. Most people use SQL as a tool to make gathering date more efficient. A SQL injection is when a malicious script is attached to a victim when they input innocuous information like a user ID or password.

Imagine what makes SQL awesome (the ability to gather information extremely quickly), and then imagine a hacker uses it to run a script on a company’s backend database. It would be devastating and they would likely need to force all of their customers to manually reset their username/password.

 

6. Code Injection

 

This is similar to a SQL injection but less specific in terms of the type of code infesting a product. Usually it is meant to gain information but sometimes it can be used to upload external Authentication, Authorization, AccountingImagine a protester hacking the White House website with anti-American messaging. This could be done via a PHP code injection. Or they could upload a file that contains a virus and wreak havoc on the page.

 

7. Server-Side Request Forgery

 

A server-side request forgery is a more direct attack on the actual server. The hack allows people to send direct requests from the backend, which hold more weight even if they are coming from the server. For example, a successful server-side request can allow a third party to hijack a URL or take advantage of legacy tech that may be caught unaware.

 

8. Insecure Direct Object Reference

 

This hack is more like the second step of a previous hack. Server-side request forgery is when hackers use legitimate information to break into an account. This means that the user (hacker) is providing direct access to an object. So while server-side request forgery is definitely a hack, it requires previous account information (possibly gained via a previous hack).





 

9. Improper Access Control

 

Improper access control is when someone breaches the typical AAA of a security model. AAA refers to the Authentication, Authorization, Accounting of an infrastructure. Improper access control happens in about 2-3% of hacks.

Oftentimes it results in a software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

 

10. Cross-Site Request Forgery

 

While less common, cross-site request forgeries are (if we lean into our nerd) kind of cool. They allow of a hacker to take total control of of a user base and execute unwanted actions. Typically in thee cases the hacker doesn’t have access to data, but it has control over functionality.

OK! Now let’s take a look at the best companies for bounty programmes according to HackerOne.

 

The top five

 

1. Verizon Media

 

#1 in All-Time Bounties Paid
#1 Most Hackers Thanked
#1 Most Reports Resolved
Top 5 Largest Top Bounty
5 Year Club

 

2. Uber

 

Top 5 Most Hackers Thanked
Top 5 Most Reports Resolved
Top 5 Fastest Response Time

 

3. Shopify

 

#1 Fastest Time to Bounty
Top 5 Most Reports Resolved
Top 5 Largest Top Bounty

 

4. PayPal

 

#1 Largest Top Bounty
Top 5 Fastest Response Time

 

5. Twitter

 

Top 5 Most Hackers Thanked
Top 5 Most Reports Resolved
5 Year Club

(function () {

function appendFbScript() {
var js, id = 'facebook-jssdk',
fjs = document.getElementsByTagName('script')[0];

if (document.getElementById(id)) return;
js = document.createElement('script');
js.id = id;
js.src = "http://connect.facebook.net/en_US/sdk.js#xfbml=1&appId=1942723912653075&version=v2.0";
fjs.parentNode.insertBefore(js, fjs);

window.fbAsyncInit = function () {
FB.init({
appId: '1942723912653075',
xfbml: true,
version: 'v2.0'
});
FB.Event.subscribe('comment.create', function (comment_data) {
console.log(comment_data);
update_comments_count();
});
FB.Event.subscribe('comment.remove', function (comment_data) {
update_comments_count();
});

function update_comments_count(comment_data, comment_action) {
jQuery.ajax({
type: 'GET',
dataType: 'json',
url: 'https://hackwarenews.com/wp-admin/admin-ajax.php',
data: {
action: 'clear_better_facebook_comments',
post_id: '6502'
},
success: function (data) {
// todo sync comments count here! data have the counts
},
error: function (i, b) {
// todo
}
}
)
};
};

appendFbScript();
}

appendFbScript();

})();

Source link

Tagged with:



Comments are closed.