{"id":9204,"date":"2018-01-17T14:49:27","date_gmt":"2018-01-17T13:49:27","guid":{"rendered":"https:\/\/mastercaweb.u-strasbg.fr\/?p=3634"},"modified":"2018-01-17T14:49:27","modified_gmt":"2018-01-17T13:49:27","slug":"bug-bounty-2","status":"publish","type":"post","link":"https:\/\/mastercaweb.unistra.fr\/en\/actualites\/un-categorized\/bug-bounty-2\/","title":{"rendered":"Bug Bounty: Apparently Good for Security"},"content":{"rendered":"<p><strong>Bug bounty<\/strong> <b>programs<\/b> are becoming increasingly popular on the web. They are promoted by major Silicon Valley companies such as Facebook, Yahoo!, Google, Reddit, and Square.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11600 size-full\" src=\"https:\/\/mastercaweb.u-strasbg.fr\/wp-content\/uploads\/2018\/01\/bugbounty-1.png\" alt=\"bug bounty: a bug found in a program\" width=\"800\" height=\"436\" srcset=\"https:\/\/mastercaweb.unistra.fr\/wp-content\/uploads\/2018\/01\/bugbounty-1.png 800w, https:\/\/mastercaweb.unistra.fr\/wp-content\/uploads\/2018\/01\/bugbounty-1-700x382.png 700w, https:\/\/mastercaweb.unistra.fr\/wp-content\/uploads\/2018\/01\/bugbounty-1-768x419.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2>What is a bug bounty and how does it work?<\/h2>\n<p>A <b>bug bounty<\/b> is an initiative that calls on <b><strong>hackers<\/strong> to detect loopholes<\/b> or anomalies in a company&#8217;s computer system. Their goal is to <b>infiltrate the company&#8217;s system<\/b> as much as possible to discover all possible flaws. Therefore, they are able to estimate their level of severity and potential for exploitation. The company is then notified if a security breach has been found, so it can be corrected. This type of service is often used by large companies to <b>improve their their <b>security<\/b><\/b>.<\/p>\n<p>Hackers are paid depending on the level of difficulty involved in detecting security flaws, the time it takes to discover such flaws, and the budget companies allocate for rewards. Of course, <b>the more difficult a task, more likely it is to inspire hackers to action.<\/b>&nbsp;Regardless of the size of a company or its infrastructure, it is often difficult for system designers to imagine how their products will hold up under real world conditions.<\/p>\n<p>The <b>bug bounty<\/b> was put out in 1995 by Netscape to find weaknesses in its browser&#8217;s security system, and therefore to reinforce it. This first bounty was a huge success and other companies followed suit by starting their own programs.<br \/>\nThere are also bug bounty platforms that are open to any company, such as the European platform <a href=\"https:\/\/bountyfactory.io\/fr\/index.html\">bountyfactory<\/a>, which is open to anyone wishing to test their computer system.<\/p>\n<p>Bug bounties can be open to the public, enabling hackers from all walks of life to contribute. Or they can remain private, targeting a particular community of hackers for the sake of confidentiality, which is sometimes necessary depending on the mission at hand.<\/p>\n<h2>Are there any security risks for companies?<\/h2>\n<p>Bug bounties are <b>programs that allow hackers to compete <\/b>with each other and build a good reputation in their community. This forms part of what is often referred to as <b>&#8220;white hat&#8221; <\/b>activity. These hackers are security experts with a code of ethics. Their aim is precisely to find loopholes and to warn the user, the company, or the creator of the product. On the contrary, a &#8220;black hat&#8221; hacker is looks for flaws with malicious intent.<\/p>\n<p>Bug bounty programs allow hackers to put themselves in the public domain, depending on the quality of the work they provide. As a result, they <b>gain notoriety and are paid by companies <\/b>for their services. In fact, rewards can be extremely large. Microsoft paid James Forshaw $100,000 for detecting a vulnerability in the Windows 8.1 operating system. Hackers chasing a bug bounty therefore have a greater interest in completing their mission and reporting flaws than exploiting them for dubious purposes.<br \/>\nSome companies still have difficulty in accepting that having their services analyzed and tested is necessary. Perhaps this is out of reluctance, since such a procedure may expose poor quality on the client&#8217;s part.<\/p>\n<p>However, policies of ignorance have never proved ideal when it comes to IT security. It is far more sensible to protect your website against hacks than to find your customer files or user database on the Internet, which can usually be downloaded freely.<\/p>\n<h3>Sources:<\/h3>\n<ul>\n<li><a href=\"https:\/\/bountyfactory.io\">https:\/\/bountyfactory.io<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/technology\/2013\/oct\/11\/microsoft-bug-hunter-100000-bounty-james-forshaw\">https:\/\/www.theguardian.com\/technology\/2013\/oct\/11\/microsoft-bug-hunter-100000-bounty-james-forshaw<\/a><\/li>\n<li><a href=\"https:\/\/fr.wikipedia.org\/wiki\/White_hat\">https:\/\/fr.wikipedia.org\/wiki\/White_hat<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Bug bounty programs are becoming increasingly popular on the web. They are promoted by major Silicon Valley companies such as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3620,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-9204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bug Bounty: Apparently Good for Security - Master CAWEB<\/title>\n<meta name=\"description\" content=\"Large companies are using bug bounty programs to root out vulnerabilities in their computer systems. Hackers receive rewards for pointing out loopholes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bug Bounty: Apparently Good for Security - Master CAWEB\" \/>\n<meta property=\"og:description\" content=\"Large companies are using bug bounty programs to root out vulnerabilities in their computer systems. Hackers receive rewards for pointing out loopholes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Master CAWEB\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/master.caweb\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-17T13:49:27+00:00\" \/>\n<meta name=\"author\" content=\"cawebinte1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mastercaweb\" \/>\n<meta name=\"twitter:site\" content=\"@mastercaweb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cawebinte1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/\"},\"author\":{\"name\":\"cawebinte1\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#\\\/schema\\\/person\\\/431b92909694c397fc8112e99e2ef4aa\"},\"headline\":\"Bug Bounty: Apparently Good for Security\",\"datePublished\":\"2018-01-17T13:49:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/\"},\"wordCount\":573,\"publisher\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/\",\"url\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/\",\"name\":\"Bug Bounty: Apparently Good for Security - Master CAWEB\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-01-17T13:49:27+00:00\",\"description\":\"Large companies are using bug bounty programs to root out vulnerabilities in their computer systems. Hackers receive rewards for pointing out loopholes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/actualites\\\/web\\\/bug-bounty-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bug Bounty: Apparently Good for Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#website\",\"url\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/\",\"name\":\"Master CAWEB\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#organization\",\"name\":\"Master CAWEB\",\"url\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/logo-caweb.webp\",\"contentUrl\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/logo-caweb.webp\",\"width\":351,\"height\":100,\"caption\":\"Master CAWEB\"},\"image\":{\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/master.caweb\",\"https:\\\/\\\/x.com\\\/mastercaweb\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/#\\\/schema\\\/person\\\/431b92909694c397fc8112e99e2ef4aa\",\"name\":\"cawebinte1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e4d7477db19aae8bc90c90565ae900f5ad6cb035ef4337cae03a3962f43935d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e4d7477db19aae8bc90c90565ae900f5ad6cb035ef4337cae03a3962f43935d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e4d7477db19aae8bc90c90565ae900f5ad6cb035ef4337cae03a3962f43935d?s=96&d=mm&r=g\",\"caption\":\"cawebinte1\"},\"sameAs\":[\"https:\\\/\\\/mastercaweb.unistra.fr\"],\"url\":\"https:\\\/\\\/mastercaweb.unistra.fr\\\/en\\\/actualites\\\/author\\\/cawebinte1\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bug Bounty: Apparently Good for Security - Master CAWEB","description":"Large companies are using bug bounty programs to root out vulnerabilities in their computer systems. Hackers receive rewards for pointing out loopholes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/","og_locale":"en_US","og_type":"article","og_title":"Bug Bounty: Apparently Good for Security - Master CAWEB","og_description":"Large companies are using bug bounty programs to root out vulnerabilities in their computer systems. Hackers receive rewards for pointing out loopholes.","og_url":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/","og_site_name":"Master CAWEB","article_publisher":"https:\/\/www.facebook.com\/master.caweb","article_published_time":"2018-01-17T13:49:27+00:00","author":"cawebinte1","twitter_card":"summary_large_image","twitter_creator":"@mastercaweb","twitter_site":"@mastercaweb","twitter_misc":{"Written by":"cawebinte1","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/#article","isPartOf":{"@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/"},"author":{"name":"cawebinte1","@id":"https:\/\/mastercaweb.unistra.fr\/#\/schema\/person\/431b92909694c397fc8112e99e2ef4aa"},"headline":"Bug Bounty: Apparently Good for Security","datePublished":"2018-01-17T13:49:27+00:00","mainEntityOfPage":{"@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/"},"wordCount":573,"publisher":{"@id":"https:\/\/mastercaweb.unistra.fr\/#organization"},"image":{"@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/#primaryimage"},"thumbnailUrl":"","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/","url":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/","name":"Bug Bounty: Apparently Good for Security - Master CAWEB","isPartOf":{"@id":"https:\/\/mastercaweb.unistra.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/#primaryimage"},"image":{"@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-01-17T13:49:27+00:00","description":"Large companies are using bug bounty programs to root out vulnerabilities in their computer systems. Hackers receive rewards for pointing out loopholes.","breadcrumb":{"@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/mastercaweb.unistra.fr\/actualites\/web\/bug-bounty-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/mastercaweb.unistra.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Bug Bounty: Apparently Good for Security"}]},{"@type":"WebSite","@id":"https:\/\/mastercaweb.unistra.fr\/#website","url":"https:\/\/mastercaweb.unistra.fr\/","name":"Master CAWEB","description":"","publisher":{"@id":"https:\/\/mastercaweb.unistra.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mastercaweb.unistra.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mastercaweb.unistra.fr\/#organization","name":"Master CAWEB","url":"https:\/\/mastercaweb.unistra.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mastercaweb.unistra.fr\/#\/schema\/logo\/image\/","url":"https:\/\/mastercaweb.unistra.fr\/wp-content\/uploads\/2024\/03\/logo-caweb.webp","contentUrl":"https:\/\/mastercaweb.unistra.fr\/wp-content\/uploads\/2024\/03\/logo-caweb.webp","width":351,"height":100,"caption":"Master CAWEB"},"image":{"@id":"https:\/\/mastercaweb.unistra.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/master.caweb","https:\/\/x.com\/mastercaweb"]},{"@type":"Person","@id":"https:\/\/mastercaweb.unistra.fr\/#\/schema\/person\/431b92909694c397fc8112e99e2ef4aa","name":"cawebinte1","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5e4d7477db19aae8bc90c90565ae900f5ad6cb035ef4337cae03a3962f43935d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5e4d7477db19aae8bc90c90565ae900f5ad6cb035ef4337cae03a3962f43935d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e4d7477db19aae8bc90c90565ae900f5ad6cb035ef4337cae03a3962f43935d?s=96&d=mm&r=g","caption":"cawebinte1"},"sameAs":["https:\/\/mastercaweb.unistra.fr"],"url":"https:\/\/mastercaweb.unistra.fr\/en\/actualites\/author\/cawebinte1\/"}]}},"_links":{"self":[{"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/posts\/9204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/comments?post=9204"}],"version-history":[{"count":0,"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/posts\/9204\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/media?parent=9204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/categories?post=9204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mastercaweb.unistra.fr\/en\/wp-json\/wp\/v2\/tags?post=9204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}