Главная
Study mode:
on
1
Intro
2
Agenda
3
Disclaimer
4
Google VRP
5
Google Bounty Program
6
Google Researcher Location Data
7
Facebook Bounty Program
8
Facebook 2014 Report
9
GitHub Bug Bounty
10
Microsoft Bug Bounty
11
Microsoft Online Services Bounty
12
Acknowledgements
13
Different Bounty Models
14
Bounty Data
15
Customers
16
Submissions
17
Rewards
18
High Priority Critical
19
Who is finding these bugs
20
Submissions by geography
21
Google
22
Facebook
23
Delete Photos
24
Simple Simple
25
Smartsheet
26
Import User Bug
27
Upload Import Bug
28
Tesla Bug Bounty
29
Authentication Bypass Bug
30
Submission Framework Expectations
31
Other Companies
32
Other Resources
33
Out Of Scope
34
Direct Performance Feedback
35
Rapid triage prioritization
36
LastPass prioritization
37
Is it worth it
38
SLA
39
Stop rewarding bad behavior
40
Reward consistently
41
Conclusions
42
Call To Action
43
Question Time
Description:
Explore critical vulnerabilities and bug bounty programs in this Black Hat conference talk. Delve into the world of cybersecurity research, examining the effectiveness of bug bounty programs and their impact on uncovering significant security flaws. Learn about highly critical vulnerabilities discovered through various programs and their consequences for customers. Analyze the balance between high-quality submissions and less impactful reports, and discover strategies for improving the overall quality of bug reports. Gain insights into different bounty models, submission frameworks, and prioritization techniques used by major tech companies. Evaluate the geographical distribution of researchers and the types of vulnerabilities they uncover. Discuss the challenges and benefits of bug bounty programs, including rapid triage, reward consistency, and performance feedback. Conclude with a call to action and engage in a question-and-answer session to deepen your understanding of this critical aspect of cybersecurity. Read more

Critical Vulnerabilities and Bug Bounty Programs

Black Hat
Add to list
0:00 / 0:00