March 3, 4 & 5, 2019, International Centre Goa, Goa


BUG BOUNTY Village is a platform for bug bounty researchers and Infosec professionals to come and share their experiences. It's an apt place to learn bug bounty, report writing, teach and learn from others. With a series of talks/trainings and awards, we want to bring this fun platform to everyone.

Bug Bounty village includes two things :

The first one is “Unique Bug of the Year award / Best Bounty Hunter of the Year”. It aims to motivate and encourage researchers to write good and effective vulnerability reports. More interestingly if your vulnerability/ bug finding report gets duplicate ,do not worry, be happy, as we will also consider the duplicate reports in the submission. We understand how much time and effort a researcher/bug bounty hunter puts into finding a bug/vulnerability.

The second is “Talks and Workshops”. It aims at sharing knowledge with the bug bounty hunters and security community people who are already in Infosec field/ getting-started/ want to start a career in information security domain.

Motivate | Share and Make Internet more secure

Call for Nominations

  • If you have reported a unique and good vulnerability in any target(Web, Mobile, IoT, Network) as part of the bug bounty program then submit your report to us.

  • If you have got duplicates ,feel free to share it with us. We will analyze it and try to do something to keep you motivated. We believe in your efforts.

  • Please report only those bugs which are already remediated.

  • If you have written any specific tool for bug hunting, do apply.

Guidelines for the report submission:

  • Report only bugs that have been fixed by the organization.

  • You can also submit reports of the private programs,which don't allow you to disclose the vulnerabilities. In this scenario, please omit the target name and required information by which the target can be identified.

  • Please submit the reports which have been submitted by you alone, do not copy-paste reports from the internet.

  • Submit the reports with POC (Proof of Concept) which signifies that the bug is disclosed to the organization.

Motivate | Share and Make Internet more secure

Submit Nomination


We will be presenting awards to top bug bounty hunters who have reported amazing security issues. We know we will be witnessing the most creative talent nationwide. This isn’t just challenging but an actual opportunity for you to connect with security experts, architects and mentors from leading tech companies.

Each and every submission will be verified by our judging panel who possess a considerable amount of experience in multiple areas of cybersecurity research and bug hunting scenes

Awards Categories :

  1. Unique bug of the year award (depends on the uniqueness of bug and report writing technique)
  2. Bug bounty hunter of the year
  3. Best self-written tool or automation methodology

Awards would be :

  1. XBOX
  2. Hak5 Gears
  3. Pentesterlab Pro Subscription
  4. Unique Swags

Note : Kindly submit your reports in the call for reports section, awards will be given at the conference only.


  • Martin Straka

    Google VRP BugHunting

    Martin Straka

    Martin will cover the Google VRP programs, some interesting facts and new things added this year to our VRP programs and also the best bugs Google received from our researchers community in the last year.

  • Andrea

    Hacking the 0day Market


    The 0day vulnerability market developed over the years in a way that is unsafe, chaotic and rather inefficient. Bad business practices, lack of professionalism and low levels of trust are still spread in this market even today and can seriously hamper the ability of law enforcement and intelligence agencies to acquire and maintain strategic cyber capabilities in order to fight organized crime, terrorism and hostile geopolitical actors. Having a deep understanding of these issues and of their solutions, Crowdfense is “hacking the 0day market” in order to improve it for all the parties involved (researchers, customers, brokers, integrators and end users), by introducing new quality standards and best practices related to products, services and to the sustainability of the underlying business processes. This session will share how Crowdfense is doing this, why, what are the results, some statistics about the 0day market and what could be the next steps.

  • Nimisha Dugalya

    Exploiting Server-Side Applications

    Nimisha Dugalya

    The workshop is hands-on white-box testing of a php-based application. Most of the server-side web applications are made up of Php, this workshop will introduce the attendees to some common vulnerabilities in php applications. This session will be a ctf based session where the related challenges will be hosted and the participants who are well ahead of the basic topics can solve them while others catch up. Topics that will be covered in this session are - common php coding mistakes, code reviewing for loopholes, server-side request forgery, deserialization vulnerability. After the session participants will have a clear understanding of how to analyze a web application for php bugs.

  • Amol Naik

    Fuzzing softwares for Bugs

    Amol Naik

    This workshop focuses on the fuzzing softwares for bugs which will cover various techniques, tools & analysis techniques starting from file fuzzers till browser fuzzing.

  • Shikhar Joshi

    Kubernetes - Overview and Exploitation

    Shikhar Joshi

    What to expect in the session: Overview of Docker (demo): - Creating a docker image user dockerfile - Uploading the docker image to docker hub - Creating a container from the image - Getting a shell within the container - Linux namespace Overview of kubernetes architecture (theory/demo if time persists) - API Server - etcd - Controller - Scheduler - Kubelet - Nodes Creation of kubernetes resources (demo) - pods - namespaces - replication controllers/sets - services - roles Exploiting kubernetes cluster (demo) - Understanding authentication and authorisation in kubernetes cluster - Understanding kubernetes secrets - Exploiting the cluster via misconfigured RBAC - Exploiting the cluster via exposed resources

  • Dhamotharan

    Decoding Multiple Vulnerabilities on Pulse Secure VPN?


    Pre-authentication arbitrary file read vulnerability (CVE-2019-11510) that revealed sensitive information like VPN client credentials, private SSH keys, and session cookies. They showed how this information was used to compromise a client session and gain access to a VPN network, then demonstrated additional post-authentication exploits that resulted in complete takeover of the VPN server. In order to exploit the issue, an attacker can send a malicious HTTP request containing directory traversal sequences along with a crafted Uniform Resource Identifier (URI) and access any file on the device.

  • Shrutirupa Banerjiee

    Crypto for Bounty Hunters

    Shrutirupa Banerjiee

    Bug bounty is one of the common platform for security researchers to learn and earn more. There are researchers out there who sometimes miss certain domains and cryptography is one such domain which should never be forgotten. The session will talk about the basics of cryptography that a bug bounty hunter has to focus on to find cryptography related flaws. The audience will learn about how a simple cryptography flaw, once ignored, can be manipulated into a vulnerability. The audience will also get to know some common cryptography based exploits to achieve bounties. Meanwhile, the audience will also learn about different vulnerabilities and their exploitations with the help of some exercises that will be provided to them along with the explanation of each vulnerability. Some of the vulnerabilities which will be covered are: JWT misconfigurations openssl based flaws Oracle Padding cbc-ecb mode weak ssl ciphers Heartbleed and many more... The targeted audience is someone who has some basic knowledge in web application security along with having some enthusiasm to learn something different.

  • Narendra

    Mobexler: AIO Mobile Pentest VM


    Ever wished to have a virtual machine with tools for security testing of Android as well as iOS applications. Well, Mobexler is a mobile pentest VM that includes a wide variety of tools to help in Android and iOS pentesting. It includes tools for both static and dynamic analysis of applications, allowing pentesters to use a single virtual machine setup and perform pentest of Android and iOS applications, both. Based on elementary OS, Mobexler provides an awesome UI experience and allows for intuitive usage of tools just like you would on a host install. External devices like iPhone/iPad/Android devices can also be connected via USB or over TCP and can be used to perform security testing on applications. more details


Review Committee

Eduardo Vela

Eduardo Vela


Laurie Mercer

Laurie Mercer


Pranav Hivarekar

Pranav Hivarekar

Nikhil Srivastava

Nikhil Srivastava


Praveen Yadav

Praveen Yadav

Prashant K V

Prashant K V

Narendra Kumar

Narendra Kumar

Pankaj Upadhyay

Pankaj Upadhyay


The schedule may be subject to change under certain circumstances

View the OWASP Seaside schedule & directory.


Contact Us for sponsoring Bug Bounty Village


International Centre Goa

Dr E Borges Rd, Dona Paula, Goa India- 403004,

Google Maps