Critical Vulnerabilities and Bug Bounty Programs

Critical Vulnerabilities and Bug Bounty Programs

Black Hat via YouTube Direct link

Intro

1 of 43

1 of 43

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Critical Vulnerabilities and Bug Bounty Programs

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Disclaimer
  4. 4 Google VRP
  5. 5 Google Bounty Program
  6. 6 Google Researcher Location Data
  7. 7 Facebook Bounty Program
  8. 8 Facebook 2014 Report
  9. 9 GitHub Bug Bounty
  10. 10 Microsoft Bug Bounty
  11. 11 Microsoft Online Services Bounty
  12. 12 Acknowledgements
  13. 13 Different Bounty Models
  14. 14 Bounty Data
  15. 15 Customers
  16. 16 Submissions
  17. 17 Rewards
  18. 18 High Priority Critical
  19. 19 Who is finding these bugs
  20. 20 Submissions by geography
  21. 21 Google
  22. 22 Facebook
  23. 23 Delete Photos
  24. 24 Simple Simple
  25. 25 Smartsheet
  26. 26 Import User Bug
  27. 27 Upload Import Bug
  28. 28 Tesla Bug Bounty
  29. 29 Authentication Bypass Bug
  30. 30 Submission Framework Expectations
  31. 31 Other Companies
  32. 32 Other Resources
  33. 33 Out Of Scope
  34. 34 Direct Performance Feedback
  35. 35 Rapid triage prioritization
  36. 36 LastPass prioritization
  37. 37 Is it worth it
  38. 38 SLA
  39. 39 Stop rewarding bad behavior
  40. 40 Reward consistently
  41. 41 Conclusions
  42. 42 Call To Action
  43. 43 Question Time

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.