Bug Bounty

5 posts tagged with “Bug Bounty”

thisclosed_#2
January 16, 2023 · 7 min read

PostgreSQL Database Exfiltration through the abuse of PostgREST requests

thisclosed_#1
January 04, 2022 · 4 min read

Full Account Takeover of ANY user via Insecure Direct Object Reference (IDOR) on reset password functionality

BitNinja bug bounty program - after the first week of testing
May 20, 2021 · 2 min read

BitNinja bug bounty program launched on our platform a few days ago, so far more than 100 ethical hackers have joined. Why the ethical hackers like this program? What are the most important factors in building up your bug bounty program?

Hunting for bugs – Getting started guide
December 02, 2020 · 6 min read

The purpose of the next few lines is to give some tips for those who just started diving into hacking. The topic is divided into two parts. Firstly, I would like to present one way to build an elementary knowledge base; then, I’ll give you an idea of how you can use it in bug bounty.

Launching a bug bounty program from a CISO's perspective
November 18, 2020 · 5 min read

How can I measure the security level of our IT systems? Should I change our pentester company every year? Where should I store the results of pentest reports? Are these questions familiar to you? If so, keep reading.