Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Critical Vulnerabilities and Bug Bounty Programs

Black Hat via YouTube

Overview

This course aims to explore critical vulnerabilities uncovered through bug bounty programs and their impact on customers. It teaches participants how to differentiate between high-priority critical bugs and noise in vulnerability submissions. The course covers various bug bounty models, submission frameworks, and the importance of rewarding consistently. The teaching method includes discussing real vulnerabilities and engaging with researchers and vendors. The intended audience for this course includes cybersecurity professionals, bug bounty hunters, researchers, and individuals interested in understanding the significance of bug bounty programs in cybersecurity.

Syllabus

Intro
Agenda
Disclaimer
Google VRP
Google Bounty Program
Google Researcher Location Data
Facebook Bounty Program
Facebook 2014 Report
GitHub Bug Bounty
Microsoft Bug Bounty
Microsoft Online Services Bounty
Acknowledgements
Different Bounty Models
Bounty Data
Customers
Submissions
Rewards
High Priority Critical
Who is finding these bugs
Submissions by geography
Google
Facebook
Delete Photos
Simple Simple
Smartsheet
Import User Bug
Upload Import Bug
Tesla Bug Bounty
Authentication Bypass Bug
Submission Framework Expectations
Other Companies
Other Resources
Out Of Scope
Direct Performance Feedback
Rapid triage prioritization
LastPass prioritization
Is it worth it
SLA
Stop rewarding bad behavior
Reward consistently
Conclusions
Call To Action
Question Time

Taught by

Black Hat

Reviews

Start your review of Critical Vulnerabilities and Bug Bounty Programs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.