Главная
Study mode:
on
1
Intro
2
Grant
3
Netscape "Bugs Bounty"
4
An (Abbreviated) History of Bug Bounties Since 1995
5
Do you really want to let people attack you?
6
Who are these people?
7
The Value of Crowdsourced Testing
8
Overview
9
But you never mentioned paying rewards!
10
Touch the code, pay the bug.
11
but first, Step 0
12
Scope
13
Focus
14
Exclusions
15
This is what a shared environment looks like...
16
Access
17
Manage Expectations
18
Communication is Key
19
Coordinated Disclosure
20
Define a Vulnerability Rating Taxonomy (VRT)
21
The Regular Methodologies
22
The Bughunter's Methodology
23
Consider the business impact!
24
Remember what it's all about.
25
Case Study: Instructure
Description:
Discover practical tips for running a successful bug bounty program in this 52-minute conference talk from AppSecUSA 2016. Learn about the history of bug bounties, the value of crowdsourced testing, and key considerations for implementing a program. Explore topics such as scope definition, managing expectations, communication strategies, and vulnerability rating taxonomies. Gain insights from experienced professionals who have managed hundreds of bug bounty programs, and understand how to effectively engage with security researchers. Delve into the challenges and benefits of bug bounty programs, including coordinated disclosure and business impact considerations. Conclude with a case study from Instructure to see real-world application of these principles.

Practical Tips for Running a Successful Bug Bounty Program

OWASP Foundation
Add to list
0:00 / 0:00