Главная
Study mode:
on
1
Introduction
2
Google Vulnerability Reward Program
3
Microsoft Bounty Program
4
State of Bug Bounty Report
5
Specific Bugs
6
Peter
7
Smartsheet
8
The Bug
9
Another Vulnerability
10
Vulnerability Overview
11
Collecting the Right Information
12
Example from Facebook
13
How to reduce noise
14
Scope documentation
15
Communicating priorities
16
Is it worth the hassle
17
Reducing noise
18
Vulnerability disclosures
19
Call to action
20
Questions
Description:
Explore critical vulnerabilities uncovered through bug bounty programs in this Black Hat 2015 presentation by Kymberlee Price. Gain insights into the impact of these vulnerabilities on customers, learn about notable bug bounty programs like Google's Vulnerability Reward Program and Microsoft's Bounty Program, and understand the state of bug bounty reporting. Examine specific bugs and vulnerabilities, including detailed breakdowns and their significance. Discover strategies for collecting essential information, reducing noise in bug reports, and effectively communicating priorities. Evaluate the value of bug bounty programs and their role in vulnerability disclosures. Engage with real-world examples from major tech companies and learn how to improve your own bug hunting and reporting skills.

Critical Vulnerabilities and Bug Bounty Programs

Bugcrowd
Add to list
0:00 / 0:00