- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 119字
- 2021-06-10 18:35:29
Reward and qualifications
This section outlines the expected rewards with respect to the vulnerabilities in a tabular form. The sections contain the category of the vulnerabilities and the reward for core applications and non-core applications. The payout ranges are listed in this section to give an idea to the researcher of what to expect in regards to which vulnerability.
This is to notify the researchers what to expect from a vulnerability and the vulnerabilities that are rewarded higher than others. Setting this benchmark allows the program owners to justify their rewards after they have resolved a vulnerability and it reduces the chances of debate in the process.

This image shows a sample bounty division that is displayed in Salesforce
推薦閱讀
- SASE原理、架構與實踐
- 信息系統(tǒng)安全檢測與風險評估
- 特種木馬防御與檢測技術研究
- INSTANT Metasploit Starter
- 深入淺出隱私計算:技術解析與應用實踐
- Getting Started with FortiGate
- Kali Linux Wireless Penetration Testing Cookbook
- 防火墻技術與應用(第2版)
- 數(shù)據(jù)安全與隱私計算(第3版)
- CTF競賽權威指南(Pwn篇)
- 數(shù)據(jù)安全領域指南
- 網(wǎng)絡服務安全與監(jiān)控
- 數(shù)據(jù)恢復技術深度揭秘
- Hands-On Bug Hunting for Penetration Testers
- 企業(yè)安全建設入門:基于開源軟件打造企業(yè)網(wǎng)絡安全