Page 35 - Hands-On Bug Hunting for Penetration Testers
P. 35

Choosing Your Hunting Ground                                                Chapter 2

            Fewer than 10% of applicants to their Red Team are accepted. And unlike the other
            programs, Synack doesn't publish a leaderboard or any sort of researcher ranking publicly
            (though they do keep internal rankings as the basis for rewards and invitations to select
            campaigns).

            Intermediaries such as Synack are great if you're looking for more of the private program-
            type of engagements you're already being invited to on Bugcrowd or HackerOne , where
            researchers receive exclusive, limited access to the target application. It's also great if you
            need a quick payout time, or want access to the professional development materials the
            company only makes available to member researchers.

            The fact that Synack keeps its researchers' identities secret is also a benefit, as d though
            adhering to the Rules of Engagement (ROE) is always important d it offers the researcher
            some protection from legal action by companies trying to discourage aggressive auditing,
            or who interpret their own RoE differently than you do.

            In general, Synack is a good option if you've already cut your teeth on bug bounty
            marketplaces where the cost to join isn't as high, and are looking to make a bigger
            commitment to security research. If you're willing and able to get passed their screening
            process, working as part of their red team will secure you less-trafficked targets, exclusive
            engagements, and quicker payouts.


            Company-Sponsored Initiatives

            Company-sponsored programs are just what they sound like. It's not just large mega-corps
            that have bounty programs d a surprising number of businesses have a process for
            rewarding security contributions. The size of each company can drastically effect the
            requirements and conditions for a reward: large companies pay top dollar for
            vulnerabilities, but the low-hanging fruit of those flaws will already have been picked;
            start-ups will have less mature applications, but probably a smaller application attack
            surface, assembled from a newer stack with fewer known vulnerabilities, and might want
            to pay for contributions in swag. Companies that are mature enough to suffer from
            technical debt, but also have a budget to pay rewards, are a nice fit. Sometimes, though,
            you'll just have to poke around in different areas, taking your chances, to find your next
            vulnerability.

            Here are some examples of the programs offered by larger companies.








                                                    [ 20 ]
   30   31   32   33   34   35   36   37   38   39   40