YoVDO

Bug Bounty Reports - How Do They Work

Offered By: nullcon via YouTube

Tags

nullcon Courses Penetration Testing Courses Report Writing Courses

Course Description

Overview

Discover how to create effective bug bounty reports in this 26-minute conference talk from nullcon Goa 2017. Learn valuable tips from Adam Bacchus, Chief Bounty Officer at HackerOne, on improving your bug reports to achieve quicker turnaround times, build better relationships with security teams, and increase your chances of earning higher bounties. Drawing from his extensive experience in penetration testing and managing bug bounty programs at Snapchat and Google, Bacchus shares best practices for interacting with security teams and answers audience questions. Gain insights from a seasoned professional who is passionate about helping both organizations and hackers succeed in collaborative vulnerability disclosure initiatives to enhance internet security.

Syllabus

nullcon Goa 2017 - Bug Bounty Reports: How Do They Work by Adam Bacchus


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube