- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 119字
- 2021-06-10 18:35:29
Reward and qualifications
This section outlines the expected rewards with respect to the vulnerabilities in a tabular form. The sections contain the category of the vulnerabilities and the reward for core applications and non-core applications. The payout ranges are listed in this section to give an idea to the researcher of what to expect in regards to which vulnerability.
This is to notify the researchers what to expect from a vulnerability and the vulnerabilities that are rewarded higher than others. Setting this benchmark allows the program owners to justify their rewards after they have resolved a vulnerability and it reduces the chances of debate in the process.

This image shows a sample bounty division that is displayed in Salesforce
推薦閱讀
- 網(wǎng)絡(luò)安全保障能力研究
- 安全技術(shù)運(yùn)營(yíng):方法與實(shí)踐
- Python Penetration Testing Cookbook
- CTF那些事兒
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- Mastering Linux Security and Hardening
- 信息組織
- 網(wǎng)絡(luò)空間安全體系
- 計(jì)算機(jī)病毒揭秘與對(duì)抗
- Metasploit Bootcamp
- 工業(yè)控制系統(tǒng)網(wǎng)絡(luò)安全實(shí)戰(zhàn)
- 大話數(shù)據(jù)恢復(fù)