Critical Vulnerabilities and Bug Bounty Programs
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Agenda
Disclaimer
Google VRP
Google Bounty Program
Google Researcher Location Data
Facebook Bounty Program
Facebook 2014 Report
GitHub Bug Bounty
Microsoft Bug Bounty
Microsoft Online Services Bounty
Acknowledgements
Different Bounty Models
Bounty Data
Customers
Submissions
Rewards
High Priority Critical
Who is finding these bugs
Submissions by geography
Google
Facebook
Delete Photos
Simple Simple
Smartsheet
Import User Bug
Upload Import Bug
Tesla Bug Bounty
Authentication Bypass Bug
Submission Framework Expectations
Other Companies
Other Resources
Out Of Scope
Direct Performance Feedback
Rapid triage prioritization
LastPass prioritization
Is it worth it
SLA
Stop rewarding bad behavior
Reward consistently
Conclusions
Call To Action
Question Time
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube