Hackers Spotlight
Last Update: 23 Feb 2023 . 16:13 PM
in
Hackers Spotlight
.
General
Prepared by: Kamal Kothyari , Saugat Pokharel, Kassem Bazzoun.
Sameer Rao is a highly respected independent security researcher with a wealth of experience in Meta bug bounty program. He has discovered numerous critical security vulnerabilities and has made invaluable contributions to the Meta bug bounty community by helping and inspiring others to enter the bug bounty field.Sameer's dedication to the community is evident in his willingness to share his write ups, provide feedback, suggestions, and ideas to help others succeed.
Recently, Sameer achieved a remarkable accomplishment by winning first place at BountyCon, a conference organized by Meta in Singapore, for the second consecutive year. This achievement demonstrates Sameer's exceptional skills and expertise in the field, making him a "rock" of the BountyCon.
We extend our sincerest appreciation to Sameer Rao for accepting our invitation to feature in the Hackers Spotlight section. His insights and experiences are valuable and inspirational to both newcomers and seasoned professionals in the industry. Thank you, Sameer, for sharing your expertise with us.
Tell us about your story on how you came to know about hacking and bug bounty,Also Can you share your first valid bug experience in Meta bug bounty, including feelings and what you did with the bounty reward?
Who has influenced you the most in bug hunting and why?
Upon joining the group in early 2019, I was inspired by the various write-ups shared by its members, which expanded my understanding of different types of bugs such as page admin disclosure and contact point disclosure. I was particularly impressed with the former group administrator, Philippe, who selflessly dedicated his time and expertise to managing the group and contributing to its growth.He is the reason for my current standing and I wish him continued success and peace.
Can you describe the research techniques/ methodology you have used in the past for approaching a target ? Do you focus on specific bug types?
You have achieved the top 1 rank in the BountyCon for the last two consecutive years, can you tell us more about this experience? How did you achieve that?
How would you deal with any conflict/disagreement with the program? Do you have an example of when you have had to deal with a disagreement?
have limited examples to share as most of the time, the team's assessment of the submission is accurate. However, there is one issue where I discovered a vulnerability that allowed me to view members of a public "subgroup", despite the description stating that only members of the parent group were able to see the group and its members,It's beneficial to shift your focus to other bugs that have a 100% validity rather than pursuing something that may be valid but uncertain. Money <<< Peace of Mind.
How do you stay motivated and remain consistent (as you have been an active participant to the program since many years now) ? What are your strategies around this ?
I was once told that employees intentionally introduce bugs into code to ensure their job don't die. Although this may seem absurd, But provides motivation. I view bug bounty as a CTF challenge, where I am in search of the "flag" (bug) within the product.To maintain consistency, I have established a weekly routine with designated tasks to keep everything organized. This helps me to remain focused and productive.
What advice would you give to beginners who are struggling for their first valid vulnerability in Meta Bug Bounty?
On which domain/asset, you've found the most bugs throughout your journey?
I primarily rely on web-based Facebook research for my findings, and I rarely test on mobile devices. In my opinion, it's better to specialize in one area of expertise rather than trying to juggle multiple areas.
==========================
Thanks again to Sameer for his valuable answers, and we extend our gratitude to the researchers in the unofficial Meta bug bounty community group for their contributions in sending questions that were included in this interview!
See you at the next installment of Hacker Spotlight!
If you have any suggestions for future series, please leave a comment below.