Загрузка страницы

Bug Bounty Programs for Beginners

Let's talk about Bug Bounty Programs. The very first Internet-based bug bounty program was launched by Netscape back in the 90s in the form of cash rewards to those who were able to find vulnerabilities in Netscape Navigator beta software. Since then, the bug bounty programs have evolved and come a long way to what they are today where nearly every large organization and even the government got one.

Bug discovery and reporting programs come in various shapes and forms so let me unpack. First, if you didn’t know, a bug bounty is a deal between a company and an ethical or white-hat hacker where the company pays the hacker to discover and share an unknown vulnerability. The bug bounty programs are offered either directly by a company such as Apple, Facebook, or Google or offered via a third-party crowd-sourced bug bounty platform such as BugCrowd or HackerOne. Bug bounty programs can be published privately or public.

Now, another variety of bug reporting is known as the Vulnerability Disclosure Policy or VDP. It has the same end goal as bug bounty programs but with one big exception and that’s the payout. For this reason, VDPs are known as the See something Say something equivalent of the internet. VDP documentation gives hackers directions on how and where to report a vulnerability. VDPs are covered by the safe harbor, a fancy legal term to assure the ethical hackers that the company will not go after them.

Now, there is yet another path for getting your feet wet with finding vulnerabilities and that’s Capture The Flag or CTF. CTFs are games where hackers have to find bugs and solve puzzles to find quote and quote flags bits of data that tell the system you've completed a given task. CTFs can be great for trying out the targets that you are most interested in like you can start with the easy stuff and work your way up to more. It is like ethical hacking with training wheels if you like.

★★ RECOMMENDED BOOKS FOR CYBERSECURITY ★★
Cybersecurity Essentials: https://amzn.to/3laX5Ui
Cybersecurity for Dummies: https://amzn.to/3lduFZZ

★★ FURTHER READING LINK ★★
Bug Bounty Setup and Tools: https://bit.ly/3hcHYtB

★★ CISCO AND DEVNET CERTIFICATIONS LEARNING MATERIAL ★★
https://cciein8weeks.com
https://fullstacknetworker.com

★★ WHO AM I ★★
https://bit.ly/3qZsCLm
https://twitter.com/AfaqMKhan

This video is made for learning and educational purposes only.

#bugbounty #ethicalhacking

Видео Bug Bounty Programs for Beginners канала Technology Leadership
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
7 мая 2021 г. 17:00:02
00:11:00
Другие видео канала
Career in Network Automation: Must-Have Security Fundamentals Knowledge for the NetDevOpsCareer in Network Automation: Must-Have Security Fundamentals Knowledge for the NetDevOpsCareer in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 1)Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 1)The Shifting Landscape of Ransomware AttacksThe Shifting Landscape of Ransomware AttacksBiden Putin Summit 2021 And the Future of CybersecurityBiden Putin Summit 2021 And the Future of CybersecurityCareer in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 4)Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 4)#SolarWinds Orion Hack for #Cyber Professionals: What Happened & How to Address Supply-Chain Attacks#SolarWinds Orion Hack for #Cyber Professionals: What Happened & How to Address Supply-Chain AttacksWhat to Do if You Get Hit By a Ransomware AttackWhat to Do if You Get Hit By a Ransomware AttackCareer in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 3)Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 3)Why Okta Hack is a Big Deal: What You Need to KnowWhy Okta Hack is a Big Deal: What You Need to KnowCareer in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 2)Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 2)Zero Trust Security Model ExplainedZero Trust Security Model ExplainedWhat We can Learn from KASEYA Ransomware AttackWhat We can Learn from KASEYA Ransomware AttackCan SIGSTORE and Code Signing Save Us from Supply Chain HacksCan SIGSTORE and Code Signing Save Us from Supply Chain HacksWhy #SolarWinds #Hack is a Big Deal for the #Cybersecurity industryWhy #SolarWinds #Hack is a Big Deal for the #Cybersecurity industryCareer in Network Automation: NAE, NETDEVOPS, NRE Job Roles ExplainedCareer in Network Automation: NAE, NETDEVOPS, NRE Job Roles ExplainedCloud is the New IT Platform: The Incoming Multi-Cloud Networking BoomCloud is the New IT Platform: The Incoming Multi-Cloud Networking BoomCyber Security Basic Terms and Concepts for Beginners (Part 2)Cyber Security Basic Terms and Concepts for Beginners (Part 2)The Holy Grail of Spyware: The Pegasus and NSO Group ExplainedThe Holy Grail of Spyware: The Pegasus and NSO Group ExplainedIs Multicloud Networking Market a Hype: What You Need to KnowIs Multicloud Networking Market a Hype: What You Need to KnowNetwork Automation with Python Libraries Netmiko, Napalm, and NornirNetwork Automation with Python Libraries Netmiko, Napalm, and NornirCareer in Network Automation: Must-Have Linux OS Fundamentals Knowledge for the NetDevOpsCareer in Network Automation: Must-Have Linux OS Fundamentals Knowledge for the NetDevOps
Яндекс.Метрика