SlideShare a Scribd company logo
BUG BOUNTY
BASICS
hack er
/’ha–kər/
noun
one who enjoys the intellectual challenge
of creatively overcoming limitations.
HACKERONE
Bug Bounty Program
/’bƏg ˈbau̇ n-tē ˈprō-ˌgram /
A program where ethical hackers are invited to
report security vulnerabilities to organizations,
in exchange for monetary rewards for useful
submissions. Bug bounties are commonly seen as
the most effective and inexpensive way to identify
vulnerabilities in live systems and products.
HACKERONE
HACKERONE
STEP ONE: DEFINE YOUR SCOPE
Create your own security program page with instructions for
hackers: what targets are in scope, what types of findings are
eligible, what types are not, what rewards you will be paying, what
behaviors are acceptable, and what the ideal vulnerability report
should look like. Start with HackerOne’s template, ask for help if
you want it, modify as needed.
BOUNTY PROGRAM SCOPE
We are interested in any vulnerability that could
negatively affect the security of our users.
OUR BOUNTIES
$100
Minimum Bounty
$500
Average Bounty
$10,000
Max Bounty
IN-SCOPE VULNERABILITIES
•	 Cross-Site Scripting
•	 Cross-Site Request Forgery
•	 Server-Side Request Forgery
•	 SQL Injection
•	 SS Remote Code Execution
•	 XML External Entity Attacks
IN-SCOPE PROPERTIES
•	 api.CompanyA.com
•	 bonjour.CompanyA.com
•	 business.CompanyA.com
•	 cn-cfe1.CompanyA.com
•	 cn-dc1.CompanyA.com
•	 cn-dc2.CompanyA.com
COMPANY A
https://hackerone.com/yourprogram
$
500
AVERAGE
HACKERONE
HOW DO I DECIDE HOW MUCH TO OFFER HACKERS?
Set bug bounty awards by technical classification of the bug and
severity of its possible impact. We recommend a minimum of $100.
The average is around $500 and the current record is $50,000. To
get attention from the world’s best hackers, pay more than the
platform average. See our full list of programs here to see how
customers have defined their bounty programs:
HACKERONE
$
50,000
CURRENT RECORD BOUNTY
$
500AVERAGE BOUNTY
$
100
MINIMUM BOUNTY
HACKERONE
WHO ARE THE HACKERS?
Hackers hail from around the world. The reason they hack is varied,
but most hack because they love the challenge, want to do good in
the world, and of course, to make money. More than 80,000 hackers
from 70+ countries are registered to hack on HackerOne and this
number grows daily. For your program, you can invite hackers based
upon reputation score, identify certain signal requirements, and even
search by vetted skills (such as expertise in native applications, mobile
applications, hardware/iOT, and web applications).
WHY DO THEY HACK?
HACKERS
ARE FROM
70+COUNTRIES
YEARS HACKING
71.5 %
TO MAKE MONEY
65.9 %
TO BE CHALLENGED
70.5 %
TO HAVE FUN
64.3 %
TO BUILD
MY RESUME
50.8 %
TO DO GOOD
IN THE WORLD
15.8% 14.3% 17% 11.3% 12%
1 2 3 4 5
HACKERONE
HOW SOON DO I GET BUGS REPORTED?
In the first day, expect 4 serious, non-duplicate vulnerability
reports. The average customer targets 10 to find in the
first 2 weeks – you can target more if you like. Ask about
HackerOne’s Fully-Managed Program if you need help with
triaging inbound reports.
HACKERONE
VALID REPORTS
DAY 01
10
8
6
4
2
DAY 14
GET RESULTS FAST
HACKERONE
HOW DO HACKERS GET PAID FOR VALID REPORTS?
For valid bugs, HackerOne handles the paperwork and payment
to a hacker anywhere in the world. Forget about international
financial compliance, tax obligations, and other payment
headaches – just leave it to us. We’ve paid hackers from 40 U.S.
states and more than 80 countries.
HACKERONE
HACKERONE
HOW DO WE KNOW THE BUG BOUNTY PROGRAM
HAS BEEN SUCCESSFUL?
When you receive valid submissions, you know that your
program is working. The sooner your engineering team
can fix the bugs found, the more secure your system
will be. You can use this information and the analytics
provided by the HackerOne platform to identify and
improve areas in your software development life cycle
that seem to be causing the most vulnerabilities.
HACKERONE
HACKERONE
Over time, your software becomes
more secure and the number of valid
submissions will slowly decline. When you
deploy new software, you may want to
offer new bounties to encourage repeat
hackers to spend their time on you again.
Stored XSS
in subdomain
Read files
lead to RCE
Private email
server compromised
at your.site.com
HACKERONE
ALWAYS BE IN THE KNOW WITH HACKERONE
PLATFORM ANALYTICS
HackerOne offers all accounts access to a Standard Dashboard
to monitor team stats in real-time and stay on top of response
time, stale issues, pending disclosures and more. Other, more
advanced tools customers love include:
HACKERONE
API Reports Sync your data with your internal data analysis tools.
HackerOne Success Index Compare your security posture against
other organizations of comparable size on key benchmark metrics.
Advanced Analytics Query more advanced reports to track metrics
measuring your program’s ROI.
Custom Analytics Work with our data science experts to fulfill
your custom reporting requirements.
HACKERONE
HackerOne is the no.1 hacker-powered security provider, connecting
organizations with the world’s largest community of trusted hackers. More
than 800 organizations, including The U.S. Department of Defense,
General Motors, Intel, Uber, Twitter, GitHub, Nintendo, Lufthansa,
Panasonic Avionics, Qualcomm, Square, Starbucks, and the CERT
Coordination Center trust HackerOne to find critical software vulnerabilities
before criminals can exploit them. HackerOne customers have resolved
more than 50,000 vulnerabilities and awarded more than $18M in bug
bounties. HackerOne is headquartered in San Francisco with offices in
London, Seattle, Los Angeles and the Netherlands.
For the most exhaustive list of live bug bounty programs, visit https://hackerone.com/bug-bounty-programs
HACKERONE
MAKE THE
INTERNET SAFER
W W W. H A C K E R O N E . C O M / S A L E S @ H A C K E R O N E . C O M / +1 ( 41 5) 8 9 1- 0 7 7 7 © 2 0 16 H A C K E R O N E
W W W. H A C K E R O N E . C O M / S A L E S @ H A C K E R O N E . C O M / +1 ( 4 1 5) 8 9 1- 0 7 7 7
Ad

More Related Content

What's hot (20)

Bug Bounty Secrets
Bug Bounty Secrets Bug Bounty Secrets
Bug Bounty Secrets
n|u - The Open Security Community
 
Bug Bounty for - Beginners
Bug Bounty for - BeginnersBug Bounty for - Beginners
Bug Bounty for - Beginners
Himanshu Kumar Das
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and FameThe Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
Shubham Gupta
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers Job
Arbin Godar
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
HackerOne
 
ABCD of Bugbounty.pptx
ABCD of Bugbounty.pptxABCD of Bugbounty.pptx
ABCD of Bugbounty.pptx
Md Atikqur Rahman
 
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
HackerOne
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
Sagar M Parmar
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
Shubham Gupta
 
Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!
Abhijeth D
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty Hunting
Muhammad Khizer Javed
 
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Deep dive into ssrf
n|u - The Open Security Community
 
Saying Hello to Bug Bounty
Saying Hello to Bug BountySaying Hello to Bug Bounty
Saying Hello to Bug Bounty
Null Bhubaneswar
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodology
bugcrowd
 
Nikto
NiktoNikto
Nikto
Sorina Chirilă
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
n|u - The Open Security Community
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and FameThe Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
Shubham Gupta
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers Job
Arbin Godar
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd
 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
HackerOne
 
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
HackerOne
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
Sagar M Parmar
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
Shubham Gupta
 
Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!Recon and Bug Bounties - What a great love story!
Recon and Bug Bounties - What a great love story!
Abhijeth D
 
Basics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty HuntingBasics of getting Into Bug Bounty Hunting
Basics of getting Into Bug Bounty Hunting
Muhammad Khizer Javed
 
Ekoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's MethodologyEkoparty 2017 - The Bug Hunter's Methodology
Ekoparty 2017 - The Bug Hunter's Methodology
bugcrowd
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 

Similar to Bug Bounty Basics (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...
HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...
HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...
kumarpriyanshu81
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Protect your website
Protect your websiteProtect your website
Protect your website
Muthu Natarajan
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
 
I LOST MY BITCOIN TO A FAKE PLATFORM HIRE ADWARE RECOVERY SPECIALIST TO RECOV...
I LOST MY BITCOIN TO A FAKE PLATFORM HIRE ADWARE RECOVERY SPECIALIST TO RECOV...I LOST MY BITCOIN TO A FAKE PLATFORM HIRE ADWARE RECOVERY SPECIALIST TO RECOV...
I LOST MY BITCOIN TO A FAKE PLATFORM HIRE ADWARE RECOVERY SPECIALIST TO RECOV...
somerstreon
 
TRUSTED CRYPTOCURRENCY RECOVERY EXPERT HIRE ADWARE RECOVERY SPECIALIST
TRUSTED CRYPTOCURRENCY RECOVERY EXPERT HIRE ADWARE RECOVERY SPECIALISTTRUSTED CRYPTOCURRENCY RECOVERY EXPERT HIRE ADWARE RECOVERY SPECIALIST
TRUSTED CRYPTOCURRENCY RECOVERY EXPERT HIRE ADWARE RECOVERY SPECIALIST
faymeghan3
 
HOW CAN I RECOVER MY LOST $40,000 TO ONLINE SCAM CONTACT ADWARE RECOVERY SPEC...
HOW CAN I RECOVER MY LOST $40,000 TO ONLINE SCAM CONTACT ADWARE RECOVERY SPEC...HOW CAN I RECOVER MY LOST $40,000 TO ONLINE SCAM CONTACT ADWARE RECOVERY SPEC...
HOW CAN I RECOVER MY LOST $40,000 TO ONLINE SCAM CONTACT ADWARE RECOVERY SPEC...
courtneyscaman42
 
LOST CRYPTO RECOVERY SERVICE HIRE ADWARE RECOVERY SPECIALIST
LOST CRYPTO RECOVERY SERVICE HIRE  ADWARE RECOVERY SPECIALISTLOST CRYPTO RECOVERY SERVICE HIRE  ADWARE RECOVERY SPECIALIST
LOST CRYPTO RECOVERY SERVICE HIRE ADWARE RECOVERY SPECIALIST
stephaniedavis7711
 
HOW TO FIND A LEGITIMATE CRYPTO RECOVERY HIRE ADWARE RECOVERY SPECIALIST
HOW TO FIND A LEGITIMATE CRYPTO RECOVERY HIRE ADWARE RECOVERY SPECIALISTHOW TO FIND A LEGITIMATE CRYPTO RECOVERY HIRE ADWARE RECOVERY SPECIALIST
HOW TO FIND A LEGITIMATE CRYPTO RECOVERY HIRE ADWARE RECOVERY SPECIALIST
kellycooper0033
 
CERTIFIED BITCOIN HACKER ONLINE CONTACT ADWARE RECOVERY SPECIALIST
CERTIFIED BITCOIN HACKER ONLINE CONTACT ADWARE RECOVERY SPECIALISTCERTIFIED BITCOIN HACKER ONLINE CONTACT ADWARE RECOVERY SPECIALIST
CERTIFIED BITCOIN HACKER ONLINE CONTACT ADWARE RECOVERY SPECIALIST
starlenewaiss5
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
dawitTerefe5
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
Felipe Prado
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
Mykonos Software
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
Chris Taylor
 
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptxDomain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
Infosectrain3
 
Nbt con december-2014-slides
Nbt con december-2014-slidesNbt con december-2014-slides
Nbt con december-2014-slides
Behrouz Sadeghipour
 
Nbt con december-2014-slides
Nbt con december-2014-slidesNbt con december-2014-slides
Nbt con december-2014-slides
Behrouz Sadeghipour
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
cat509
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...
HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...
HackerOne X IoT Lab Bug Bounty 101 with Encryptsaan & IoT Lab at KIIT Univers...
kumarpriyanshu81
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
 
I LOST MY BITCOIN TO A FAKE PLATFORM HIRE ADWARE RECOVERY SPECIALIST TO RECOV...
I LOST MY BITCOIN TO A FAKE PLATFORM HIRE ADWARE RECOVERY SPECIALIST TO RECOV...I LOST MY BITCOIN TO A FAKE PLATFORM HIRE ADWARE RECOVERY SPECIALIST TO RECOV...
I LOST MY BITCOIN TO A FAKE PLATFORM HIRE ADWARE RECOVERY SPECIALIST TO RECOV...
somerstreon
 
TRUSTED CRYPTOCURRENCY RECOVERY EXPERT HIRE ADWARE RECOVERY SPECIALIST
TRUSTED CRYPTOCURRENCY RECOVERY EXPERT HIRE ADWARE RECOVERY SPECIALISTTRUSTED CRYPTOCURRENCY RECOVERY EXPERT HIRE ADWARE RECOVERY SPECIALIST
TRUSTED CRYPTOCURRENCY RECOVERY EXPERT HIRE ADWARE RECOVERY SPECIALIST
faymeghan3
 
HOW CAN I RECOVER MY LOST $40,000 TO ONLINE SCAM CONTACT ADWARE RECOVERY SPEC...
HOW CAN I RECOVER MY LOST $40,000 TO ONLINE SCAM CONTACT ADWARE RECOVERY SPEC...HOW CAN I RECOVER MY LOST $40,000 TO ONLINE SCAM CONTACT ADWARE RECOVERY SPEC...
HOW CAN I RECOVER MY LOST $40,000 TO ONLINE SCAM CONTACT ADWARE RECOVERY SPEC...
courtneyscaman42
 
LOST CRYPTO RECOVERY SERVICE HIRE ADWARE RECOVERY SPECIALIST
LOST CRYPTO RECOVERY SERVICE HIRE  ADWARE RECOVERY SPECIALISTLOST CRYPTO RECOVERY SERVICE HIRE  ADWARE RECOVERY SPECIALIST
LOST CRYPTO RECOVERY SERVICE HIRE ADWARE RECOVERY SPECIALIST
stephaniedavis7711
 
HOW TO FIND A LEGITIMATE CRYPTO RECOVERY HIRE ADWARE RECOVERY SPECIALIST
HOW TO FIND A LEGITIMATE CRYPTO RECOVERY HIRE ADWARE RECOVERY SPECIALISTHOW TO FIND A LEGITIMATE CRYPTO RECOVERY HIRE ADWARE RECOVERY SPECIALIST
HOW TO FIND A LEGITIMATE CRYPTO RECOVERY HIRE ADWARE RECOVERY SPECIALIST
kellycooper0033
 
CERTIFIED BITCOIN HACKER ONLINE CONTACT ADWARE RECOVERY SPECIALIST
CERTIFIED BITCOIN HACKER ONLINE CONTACT ADWARE RECOVERY SPECIALISTCERTIFIED BITCOIN HACKER ONLINE CONTACT ADWARE RECOVERY SPECIALIST
CERTIFIED BITCOIN HACKER ONLINE CONTACT ADWARE RECOVERY SPECIALIST
starlenewaiss5
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
dawitTerefe5
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
Felipe Prado
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
Chris Taylor
 
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptxDomain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
Infosectrain3
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
cat509
 
Ad

More from HackerOne (16)

Top 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsTop 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty Programs
HackerOne
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
HackerOne
 
Federal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideFederal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security Guide
HackerOne
 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment Types
HackerOne
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
HackerOne
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
HackerOne
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
HackerOne
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
HackerOne
 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure Policy
HackerOne
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
HackerOne
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
HackerOne
 
Bug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchBug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 Research
HackerOne
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
HackerOne
 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...
HackerOne
 
HackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning Wang
HackerOne
 
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityTapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
HackerOne
 
Top 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty ProgramsTop 20 Public Bug Bounty Programs
Top 20 Public Bug Bounty Programs
HackerOne
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
HackerOne
 
Federal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideFederal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security Guide
HackerOne
 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment Types
HackerOne
 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
HackerOne
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
HackerOne
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
HackerOne
 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
HackerOne
 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure Policy
HackerOne
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
HackerOne
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
HackerOne
 
Bug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchBug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 Research
HackerOne
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
HackerOne
 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...
HackerOne
 
HackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning Wang
HackerOne
 
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityTapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
HackerOne
 
Ad

Recently uploaded (19)

Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 

Bug Bounty Basics

  • 2. hack er /’ha–kər/ noun one who enjoys the intellectual challenge of creatively overcoming limitations. HACKERONE
  • 3. Bug Bounty Program /’bƏg ˈbau̇ n-tē ˈprō-ˌgram / A program where ethical hackers are invited to report security vulnerabilities to organizations, in exchange for monetary rewards for useful submissions. Bug bounties are commonly seen as the most effective and inexpensive way to identify vulnerabilities in live systems and products. HACKERONE
  • 4. HACKERONE STEP ONE: DEFINE YOUR SCOPE Create your own security program page with instructions for hackers: what targets are in scope, what types of findings are eligible, what types are not, what rewards you will be paying, what behaviors are acceptable, and what the ideal vulnerability report should look like. Start with HackerOne’s template, ask for help if you want it, modify as needed.
  • 5. BOUNTY PROGRAM SCOPE We are interested in any vulnerability that could negatively affect the security of our users. OUR BOUNTIES $100 Minimum Bounty $500 Average Bounty $10,000 Max Bounty IN-SCOPE VULNERABILITIES • Cross-Site Scripting • Cross-Site Request Forgery • Server-Side Request Forgery • SQL Injection • SS Remote Code Execution • XML External Entity Attacks IN-SCOPE PROPERTIES • api.CompanyA.com • bonjour.CompanyA.com • business.CompanyA.com • cn-cfe1.CompanyA.com • cn-dc1.CompanyA.com • cn-dc2.CompanyA.com COMPANY A https://hackerone.com/yourprogram $ 500 AVERAGE
  • 6. HACKERONE HOW DO I DECIDE HOW MUCH TO OFFER HACKERS? Set bug bounty awards by technical classification of the bug and severity of its possible impact. We recommend a minimum of $100. The average is around $500 and the current record is $50,000. To get attention from the world’s best hackers, pay more than the platform average. See our full list of programs here to see how customers have defined their bounty programs:
  • 8. HACKERONE WHO ARE THE HACKERS? Hackers hail from around the world. The reason they hack is varied, but most hack because they love the challenge, want to do good in the world, and of course, to make money. More than 80,000 hackers from 70+ countries are registered to hack on HackerOne and this number grows daily. For your program, you can invite hackers based upon reputation score, identify certain signal requirements, and even search by vetted skills (such as expertise in native applications, mobile applications, hardware/iOT, and web applications).
  • 9. WHY DO THEY HACK? HACKERS ARE FROM 70+COUNTRIES YEARS HACKING 71.5 % TO MAKE MONEY 65.9 % TO BE CHALLENGED 70.5 % TO HAVE FUN 64.3 % TO BUILD MY RESUME 50.8 % TO DO GOOD IN THE WORLD 15.8% 14.3% 17% 11.3% 12% 1 2 3 4 5
  • 10. HACKERONE HOW SOON DO I GET BUGS REPORTED? In the first day, expect 4 serious, non-duplicate vulnerability reports. The average customer targets 10 to find in the first 2 weeks – you can target more if you like. Ask about HackerOne’s Fully-Managed Program if you need help with triaging inbound reports.
  • 12. HACKERONE HOW DO HACKERS GET PAID FOR VALID REPORTS? For valid bugs, HackerOne handles the paperwork and payment to a hacker anywhere in the world. Forget about international financial compliance, tax obligations, and other payment headaches – just leave it to us. We’ve paid hackers from 40 U.S. states and more than 80 countries.
  • 14. HACKERONE HOW DO WE KNOW THE BUG BOUNTY PROGRAM HAS BEEN SUCCESSFUL? When you receive valid submissions, you know that your program is working. The sooner your engineering team can fix the bugs found, the more secure your system will be. You can use this information and the analytics provided by the HackerOne platform to identify and improve areas in your software development life cycle that seem to be causing the most vulnerabilities. HACKERONE
  • 15. HACKERONE Over time, your software becomes more secure and the number of valid submissions will slowly decline. When you deploy new software, you may want to offer new bounties to encourage repeat hackers to spend their time on you again. Stored XSS in subdomain Read files lead to RCE Private email server compromised at your.site.com
  • 16. HACKERONE ALWAYS BE IN THE KNOW WITH HACKERONE PLATFORM ANALYTICS HackerOne offers all accounts access to a Standard Dashboard to monitor team stats in real-time and stay on top of response time, stale issues, pending disclosures and more. Other, more advanced tools customers love include:
  • 17. HACKERONE API Reports Sync your data with your internal data analysis tools. HackerOne Success Index Compare your security posture against other organizations of comparable size on key benchmark metrics. Advanced Analytics Query more advanced reports to track metrics measuring your program’s ROI. Custom Analytics Work with our data science experts to fulfill your custom reporting requirements.
  • 18. HACKERONE HackerOne is the no.1 hacker-powered security provider, connecting organizations with the world’s largest community of trusted hackers. More than 800 organizations, including The U.S. Department of Defense, General Motors, Intel, Uber, Twitter, GitHub, Nintendo, Lufthansa, Panasonic Avionics, Qualcomm, Square, Starbucks, and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities before criminals can exploit them. HackerOne customers have resolved more than 50,000 vulnerabilities and awarded more than $18M in bug bounties. HackerOne is headquartered in San Francisco with offices in London, Seattle, Los Angeles and the Netherlands. For the most exhaustive list of live bug bounty programs, visit https://hackerone.com/bug-bounty-programs
  • 19. HACKERONE MAKE THE INTERNET SAFER W W W. H A C K E R O N E . C O M / S A L E S @ H A C K E R O N E . C O M / +1 ( 41 5) 8 9 1- 0 7 7 7 © 2 0 16 H A C K E R O N E
  • 20. W W W. H A C K E R O N E . C O M / S A L E S @ H A C K E R O N E . C O M / +1 ( 4 1 5) 8 9 1- 0 7 7 7