Cybersecurity Penetration Testing On The Ethereum Blockchain
Cybersecurity Penetration Testing On The Ethereum Blockchain
Cybersecurity Penetration Testing On The Ethereum Blockchain
This document contains proprietary information. Expressed written consent by Buglab Limited (“Buglab”)
is required for duplication or distribution of any content contained herein.
Table of Contents
4 Abstract
7 Blockchain Security
12 Defining Requirements
14 Real-Time Reporting
15 Contest Details
17 Contest Scoring
18 Vulnerability Timestamp
19 Fix Companion
20 Money-Back Guarantee
20 Service Levels
21 Vigilante Protocol
31 Management Team
33 Legal Disclaimer
THIS DOCUMENT IS NOT A PROSPECTUS OF ANY SORT
THIS WHITEPAPER SETS FORTH A DESCRIPTION OF THE PLANNED BUGLAB PLATFORM (THE “BUGLAB
PLATFORM”) AND USE OF THE BUGLAB TOKEN (THE “BGL TOKEN”). THIS IS BEING PROVIDED FOR
INFORMATION PURPOSES ONLY AND IS NOT A BINDING LEGAL AGREEMENT. BGL TOKEN SALES WILL BE
GOVERNED BY A TOKEN PURCHASE AGREEMENT. IN THE EVENT OF A CONFLICT BETWEEN THE TOKEN
PURCHASE AGREEMENT AND THIS WHITEPAPER, THE TOKEN PURCHASE AGREEMENT GOVERNS.
Abstract
Today’s computing environment is dynamic and complex. Demand for
cybersecurity professionals exceeds supply as hackers develop ever more
advanced schemes that target countless companies, both large and small.
11%
Security Certifications Consortium, Inc.
(ISC)2 forecasted that the number of
unfilled job offers in cybersecurity will
surpass well over 1.5 million by 2020.
Demand resulting from IoT or other from $138 billion in 2017
smart technology implementations is to $232 billion in 2022.
likely part of this cybersecurity growth.
3
ABSTRACT
Buglab will offer a unique, competitive, The Buglab platform detects and
incentivized, and easy-to-use platform remedies vulnerabilities on various
to address this widespread and growing business applications, websites, mobile
business need. Buglab will assist applications, Internet of Things (IoT)
companies, whether in IT, financial devices , and smart contracts by
services, or in retail, to identify and transforming penetration test services
mitigate cybersecurity gaps they may into challenges, referred to as contests,
not (but should) know about. for a community of independent
information security consultants with
certified qualifications.
4
The Cybersecurity Market
Impacts on Return on Investment (ROI) are difficult to quantify, so it takes
time for companies to recognize the need for cybersecurity services.
50 billion
ONLINE DEVICES BY 2025
5
THE CYBERSECURITY MARKET
A standout case is that of the 2016 U.S. More recently, in May, 2017, emails and
presidential election campaign, when a documents were taken from the
massive email leak cast a shadow over mailboxes of several senior officials who
the Democratic party in July 2016. Sen. were a part of the then-future French
Hillary Clinton’s campaign was the President Emmanuel Macron’s “En
victim of a large-scale cyber attack that Marche” political movement. Their
not only put the Democratic party’s contents were exposed across social
electoral strategy in peril, but also media networks at the campaign’s final
shaped the future of American politics. hour.
In that July Reuters reported that a
There have also been countless,
“computer network used by Democratic
wide-scale breaches of medical, financial,
presidential nominee Hillary Clinton’s
and email data affecting small businesses
campaign was hacked as part of a broad
and individual users. Most readers have
cyber attack on Democratic political
seen their email or have known of a
organizations.” The article went onto
personal website that’s gotten hacked.
say that the attack “follows two other
The New York Times as well as other
hacks on the Democratic National
media sources reported on Yahoo’s
Committee, or DNC, and the party’s
disclosure that a massive breach affected
fundraising committee for candidates
500 million accounts during 2014. An
for the U.S. House of Representatives.”
earlier incident in 2013 compromised
some 3 billion users, that is all Yahoo
accounts, The Guardian and New York
Times, among other outlets reported. The
figure given out by Yahoo to the press was
… a massive breach originally 1 billion but was revised upward
affected 500 million several months later after further
investigation. Clearly, new methods to get
accounts during 2014.
ahead of the hackers are needed.
6
Blockchain Security
The method offered by Buglab deploys expertise and smart contracts across
the blockchain.
Requires that clients pay for the service in terms of total billable hours,
regardless of the test results. The majority of penetration tests performed
by consulting firms are done by one, maybe two pentesters. This means
that the client is only able to take advantage of the methodology and
skillset of two consultants.
8
METHODS OF FIGHTING CYBERCRIME
The first reason for this is cost. Secondly, the results obtained are not
Companies that rely on bug bounty always relevant to the client. When
methods are often required to pay for using these bounty programs,
each vulnerability that’s reported. Since researchers are often able to rapidly
many of these companies lack internal uncover a number of significant flaws,
infrastructure and/or software without the requirement to do in-depth
development teams, they end up paying research. They will easily achieve a
to identify problems for which they lack reward level based upon a total count
resources to fix. Obviously, this is an of issues discovered without necessarily
inefficient way to correct vulnerabilities. adding significant value for the client.
9
The Buglab Solution
The Buglab platform links organizations that have information security
needs, which is just about all them, with a community of certified
cybersecurity penetration testers in an incentivized environment, where
testers are rewarded when they uncover system vulnerabilities, ranked by
severity and potential impacts. It’s done as a race against time. Importantly,
finding unique vulnerabilities is ranked above simply producing a list of
issues.
The Buglab platform enables customers to either use the mass of pentesters or choose
a validated team from a known company. Teams must include no fewer than five
pentesters.
Once companies have provided basic Clients also have the option of
information and launched the choosing a select number of
contest, the community receives a pentesters from the community or
public invitation to participate in the choose a validated team from a
competition. known cybersecurity firm to
complete the challenge.
10
THE BUGLAB SOLUTION
Reports:
Self-Managed:
The company receives reporting on
The company can choose from three
their security contests. This feature
types of management (basic, pro,
summarizes each contest’s
and enterprise). In the case of the
performance and allows them to
latter, the client is responsible for
graphically compare the security
sorting, classifying and grading
status and progress of their assets.
reports.
Mediation: Leaderboard:
When a customer opts to manage
A dashboard offers ranking of
their challenge themselves, a
pentesters from the community
pentester from the community can
according to experience and results
ask for mediation from Buglab. This
on the platform. This provides
mediation may be required in the
greater visibility for the best
event that a pentester deems the
pentesters and makes it easier to
score or validation to be inaccurate.
select participants for a private
A Buglab team can obtain details
challenge.
regarding the cause of the
disagreement and evaluate it in an
impartial fashion.
11
THE BUGLAB SOLUTION
Defining Requirements
The list of potential use cases is quite long. Scenarios might include uncovering
malicious SQL injection, which routes database content to a hacker. A system may have
authentication bypass vulnerabilities. Sensitive company data may be unencrypted. File
uploads may not be protected. User sessions may be subject to takeover by malicious
entities. Perhaps the vulnerability is relatively straight-forward: for example, a company
may have insufficient login security. The Buglab strategy addresses these and other
vulnerabilities in a cost-effective manner to tackle cybercrime and its impact on the
bottom line.
The platform’s design offers multiple solutions against the threats of cybercrime. Using
either the Professional or Enterprise plans gives firms access to private teams. For
example, a penetration test contest might be closed to all but a preselected team,
depending upon the sensitivity of the data. Alternatively, a business may choose from
other packages to use an open contest model to address system vulnerabilities.
In either use case, our design provides a reward for identifying IT vulnerabilities, and
also forms the infrastructure to solve these issues. Because it takes the form of a
contest, whereby the client has constant access to penetration test results, it’s
real-time and cost effective.
12
THE BUGLAB SOLUTION
By offering contests, Buglab caps user costs by charging a fixed price that features a
money-back guarantee in the event no vulnerabilities are detected. Within the
challenge or contest framework, community pentesters act independently (though on
the same project) to use their diverse technical skills to find and expose security flaws.
They are thus able to discover a large number of vulnerabilities in a short amount of
time. It’s an efficient model for uncovering cyber threats.
13
THE BUGLAB SOLUTION
Real-Time Reporting
Companies staff follow the contest as they unfold in real time to see
reported vulnerabilities and mitigation recommendations. They’ll have the
means of communicating with the pentesters for follow up. The platform
also can integrate with other reporting tools, at your company’s discretion.
The contest dashboard provides quick access to the progress made by researchers, the
type of vulnerabilities uncovered, and top contributors.
The dashboard also enables real-time interactions in a intuitive way to help clients
address the vulnerabilities with the help of the researchers or the Buglab team.
14
The Contest
Companies sign up on the platform and Clients are able to customize the
provide information about themselves confidentiality1 of the competition, the
and their products and services. Then, type of management they want, and the
thanks to a simple and user-friendly level of compensation, which depends
interface, they subscribe to a upon the selected plan and an optional
competition contract, whose rules they bonus. As necessary, a Buglab team will
define. interact with customers to help them
set up program parameters.
1
As the contests can be self managed, only the client and pentester who found the bug will have access to vulnerability details.
Pentesters are bound by the Terms and Conditions required during signup to ensure ethical use of the data.
THE CONTEST
The Buglab platform also assigns a Using the methods that Buglab offers,
proper match based upon the Buglab penetration testing follows a unique
recommendation engine. trajectory, as shown in the following
figure.
The scoring system encourages (that is, incentivizes) each pentester to be the first to
uncover a maximum amount of vulnerabilities, and to obtain the highest score. Each
vulnerability is assigned a score. An undiscovered issue gets a full score. Scoring for
duplicate entries factors in timestamp (to encourage early reporting of significant
vulnerabilities) and the number of pentesters. See also Vulnerability Timestamp.
2
Every pentester operates under the assumption that no vulnerability nor any details associated with a vulnerability
issue will be shared with any person or company aside from the customer/client, unless explicitly allowed by the client.
Sharing of any proprietary information is subject to client policy. Moreover, jurisdictional regulations with regards to
access to private data vary.
16
THE CONTEST
Contest Scoring
Upon the contest launch our community When the contest concludes, the role of
of pentesters that have registered with Buglab is limited to vulnerability scoring
Buglab is notified. Our international and triage using the Common
cybersecurity pentesters then analyze, Vulnerability Scoring System 3 (CVSS3)
test, and report back on the standard described in Vulnerability
vulnerabilities of a solution directly on Timestamp. Pentesters are
the Buglab platform. compensated according to their rank in
the contest.
In the event of a dispute, a Buglab internal team may act as a mediator to help clarify
unresolved issues. This could occur, for example, if scores are in dispute or the validity
of a vulnerability is in question.
17
THE CONTEST
Vulnerability Timestamp
In the event of duplication, Buglab can provide the means of verification of a score
assigned to a pentester, fully securely, without ever revealing any sensitive information
whatsoever
18
THE CONTEST
Fix Companion
At the Enterprise level, Buglab will Through the entire duration of the
verify that the fix has been challenge companies can chat with
implemented. Buglab will attempt to pentesters and access reports, they will
verify (exploit) the vulnerability again. be able to implement
When confirmed as fixed, a Buglab team recommendations to remedy the
of analysts will update the status vulnerabilities in real time. This is
accordingly in the platform. A “fix” can especially useful if the vulnerabilities
be declined by Buglab to give the and the associated fixes are time
company a chance to address the sensitive. Companies need not wait until
vulnerability again. The company will be the end of the contest to implement a
allotted up to five attempts to address fix.
the vulnerability issue.
19
THE CONTEST
Money-Back Guarantee
At the end of the contest, if it turns out that our customer’s systems are free of
vulnerabilities, Buglab will automatically refund, using our smart contract, 90 percent of
the cost of the contest. The remaining ten percent are retained for the Vigilante
Protocol Reserve (VPR), as explained below in the section titled Vigilante Protocol.
Service Levels
For a fixed price, Buglab will organize penetration tests done by experts pre-approved
by our team. Highlights of the features with the three service levels are provided in the
following table.
Team management
Issue tracker integration
Reports analytics
Chat with pentesters
Public contests
20
Vigilante Protocol
This protocol enables whitehats from the community as well as anonymous whitehat
users to report vulnerabilities in a secure and ethical way3 to companies that are not
Buglab customers4.
A company can chose to give a whitehat an optional reward and/or order a contest. If a
company orders a contest, the whitehat will receive two percent of the service cost.
Buglab will recommend that the company invite this whitehat to participate, even if
he/she doesn’t have pentester status.
3
An ethical hacker’s role is similar to that of a penetration tester, but it involves broader issues. Aside from testing
duties, ethical hackers are often tasked with other responsibilities such as finding countermeasures to beef up the
system’s defenses.
4
Note that Buglab will report a vulnerability to the applicable CSIRT without attempting to exploit any vulnerability
discovered by the whitehat researcher.
22
VIGILANTE PROTOCOL
23
VIGILANTE PROTOCOL
When the contest begins, ten percent of the cost to launch the contest will be
automatically transferred into the VPR via the smart contract. This will be
automatically taken from the customer's payment. The customer has no control
no influence over this process.
When a verified pentester wins a customer run contest, the pentester will be
rewarded automatically through the smart contract.
24
VIGILANTE PROTOCOL
This is standard for all contests. However, at the end of the contest, the contest
owner also has the option to make additional payouts to pentesters who may not
have won, though rank near the top, and/or have identified significant
vulnerabilities. It may be the case that other submissions provide more thorough
and useful test vectors. The contest owner can choose to gift the close
competitors a discretionary amount of tokens. The VPR will automatically take
ten percent of these tokens.
Where VPRTDE is the (Token Distribution Event (TDE) allocation to the VPR, Ccontest is a customer’s
cost for a contest, Rcustom is any custom reward from a contest, Rwhitehat is any optional reward given
to a whitehat researcher by the concerned company, N is the total number of contests run so far,
and i is the contest number for the individual contest.
25
VIGILANTE PROTOCOL
After an initial allocation from the TDE, which is one percent, the reserve will
be funded with smart contracts by reserving:
26
VIGILANTE PROTOCOL
At any given point in time, the BTR value is given by the following equation:
Where BTRTDE is the TDE allocation to the BTR, Ccontest is a customer’s cost for a contest,
Rcontest is a reward from a contest, RVPR is a reward from the VPR, Fpaid is the fees paid for
the transactions on a contest, N is the total number of contests run so far, and i is the
contest number for the individual contest.
27
The Buglab Token
occurs in the following scenarios. ● To reward CERTs and CSIRTs for triaging
of vulnerabilities and help build new
partnerships.
THE BUGLAB TOKEN
Tokens can be transferred between two The BGL Token is based on the ERC20
parties over the Internet according to standard for blockchain tokens. As
the rules set within the contract that illustrated in the following figure, the
holds the token. During the TDE, tokens token will be required for all
are pre-sold at a discount to users who transactions made within the
see value in the platform and anticipate ecosystem, including ordering a contest.
they will use the tokens to access the
platform when it is ready and generally
available for public use.
29
THE BUGLAB TOKEN
Most highly skilled penetration testers and whitehats don’t want to disclose their
financial information in order to receive payments, so by creating a token we are able to
attract those people. We also believe that this is the best solution for rewarding
whitehats who participate in the vigilante process as guests.
Full details of Buglab’s TGE are set out in Buglab’s TDE document (a copy of which can
be found at the “TDE Document”.
30
Management Team
We are united by our mission to help companies protect their digital
solutions.
Reda Cherqaoui
Founder, CEO
Youness Aamiri
Blockchain Developer
Amine Bioudi
Full Stack Developer
31
MANAGEMENT TEAM
Azdine Bouhou
Software Architect
Dalal Cherqaoui
Marketing and Communications Manager
Herve Schauer
Advisor
32
Advantages of Using the
Blockchain to Reshape Pentesting
Characteristics of the ecosystem are highlighted in this section.
Disintermediation:
For a transaction to go into effect, it has to be approved by all the miners, which
verify the transaction’s validity. Only then can a transaction be incorporated into
network nodes on the blockchain. Adding new blocks requires a consensus
between the network’s players. This process renders control by a third party
obsolete.
Security:
The code for each new block is built on that of the block that precedes it in the
blockchain, in such a way that modifying a single block would involve changing all
of the blocks in the chain, which is impossible. Within a blockchain, the blocks as a
whole are replicated across nodes on the network, and don’t reside on an
individual single server. This decentralized architecture acts as a structural
defense against risks of data theft. The data on these blocks is protected by a
number of innovative cryptographic procedures, to prevent modification after
the fact.
Autonomy:
Within a blockchain, servers and supporting architecture are dispersed across the
network. The blockchain is ideally independent of third party services. Miners
allocate a portion of their machine’s powerful calculating power to compute
algorithms required to validate transactions. This work is rewarded. In the Buglab
contest, the first miner to validate a block wins tokens. This opportunity for
financial gain encourages powerful competition. For uncovering cybersecurity
threats, this method provides value to the client.
33
ADVANTAGES OF USING THE BLOCKCHAIN TO RESHAPE PENTESTING
Smart Contract:
A smart contract is an “If this, then that” logic. It verifies that the goal has been
met and then enables a digital transfer. The terms of the contract are not
changeable after the fact, although the parties involved still retain access. The
competitive nature of contests make them a crucial part of accelerating
exchanges. In this environment, pentesters will discover and communicate
vulnerabilities quickly.
Legal Disclaimer
As of the date of publication of this whitepaper, No promises of future performance or value are or
BGL Tokens have no known potential uses outside will be made with respect to BGL Tokens, including
of the Buglab platform ecosystem. This whitepaper no promise of inherent value, no promise of
does not constitute advice nor a recommendation continuing payments, and no guarantee that BGL
by Buglab, its officers, directors, managers, Tokens will hold any particular value.
employees, agents, advisors or consultants, or any
other person to any recipient of this document on Unless prospective participants fully understand
the merits of the participation in the TDE sale. and accept the nature of Buglab and the potential
Participation in the TDE carries substantial risks and risks inherent in BGL Tokens, they should not
may involve special risks that could lead to a loss of participate in the TDE. BGL Tokens are not being
all or a substantial portion of such investment. structured or sold as securities. BGL Tokens are sold
as a functional good and all proceeds received by
Do not participate in the TDE unless you are Buglab may be spent freely by Buglab, absent any
prepared to lose the entire amount you allocated to conditions set out in this whitepaper. This
purchasing BGL Tokens. BGL Tokens should not be whitepaper is not a prospectus or disclosure
acquired for speculative or investment purposes document and is not an offer to sell, nor a
with the expectation of making a profit or solicitation of any offer to buy any investment or
immediate resale. financial instrument in any jurisdiction and should
not be treated or relied upon as one.
34
LEGAL DISCLAIMER
This whitepaper is for information only. Written Buglab believes that this industry data is accurate
authorization is required for distribution of any or and that its estimates and assumptions are
all parts contained herein. reasonable; however, there are no assurances as to
the accuracy or completeness of this data. Third
All information here that is forward looking is party sources generally state the information
speculative in nature and may change in response contained therein has been obtained from sources
to numerous outside forces, including technological believed to be reliable; however, there are no
innovations, regulatory factors, and/or currency assurances as to the accuracy or completeness of
fluctuations, including but not limited to the included information. Although the data are
market value of cryptocurrencies. believed to be reliable, Buglab has not
independently verified any of the data from third
This whitepaper is for information purposes only
party sources referred to in this whitepaper or
and is subject to change. Buglab cannot guarantee
ascertained the underlying assumptions relied upon
the accuracy of the statements made or conclusions
by such sources.
reached in this document.
● that the contents of this document are whitepaper and upload the latest version of this to
● that such contents do not infringe upon Any BGL Tokens could be impacted by regulatory
any third party rights. Buglab shall have no action, including potential restrictions on the
liability for damages of any kind arising out ownership, use, or possession of such tokens.
of the use, reference to or reliance on the Regulators or other circumstances may demand
contents of this document, even if advised that the mechanics of the BGL Tokens be altered,
of the possibility of such damages. all or in part. Buglab may revise mechanics to
comply with regulatory requirements or other
governmental or business obligations.
This whitepaper includes references to third party
Nevertheless, Buglab believes they have taken all
data and industry publications.
commercially reasonable steps to ensure that its
planned mechanics are proper and in compliance
with currently considered regulations.
35
LEGAL DISCLAIMER
proposed operating model. The model speaks to and regulations in the countries where it operates
its objectives only, and is not a forecast, projection or intends to operate. There is a risk that certain
36