Friday 17 August 2012

Make Money by Reporting Bugs And Security Vulnerabilities

This is news for all researchers, hackers and developers. Now the lot of you can earn money by doing what you do best, search for vulnerabilities in sites and programs such as Facebook, Mozilla and PayPal. The first company to ever introduce this idea to the masses was Mozilla and soon after, Google followed suit. Facebook was the next in line. All these major shareholders of today's internet services began offering $500 worth of bounty ages ago. As the time passed, they too have increased their rewards paying as much as $3000 and above.

FACEBOOK

Facebook has started to follow in the footsteps of Mozilla and Google by launching a "bug bounty" program where people who find and report bugs and vulnerabilities can cash in on them. The "Responsible Disclosure Policy" program, through which researchers and developers can report flaws in the website, can reward up to $500 and above.

According to Facebook;

"If you give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research, we will not bring any lawsuit against you or ask law enforcement to investigate you."

Bugs that you can submit to Facebook:
1. Cross-Site Scripting (XSS)
2. Cross-Site Request Forgery (CSRF/XSRF)
3. Remote Code Injection
4. Broken Authentication (including Facebook OAuth bugs)
5. Circumvention of Platform permission model
6. A bug that allows a third-party to view private user data

Basically, anyone can cash into this opportunity but to qualify you must:
1.Be the first person to privately report the bug
2. Reside in a country not under any current US sanctions
3. Must abide to the Responsible Disclosure Policy and
4. The bug found could potentially compromise the integrity or privacy of Facebook user data.

The following would lead to disqualification in the bug bounty program:
1. Denial-of-service vulnerabilities
2. Spam and social engineering techniques and
3. Bugs in third-party apps and websites and Facebook's corporate infrastructure.

To submit your report click here.

GOOGLE


Bugs and vulnerabilities that you can submit to Google:

1. .google.com
2. .youtube.com
3. .bloggers. com
4. .orkut.com

Bugs that you can submit to Google:
1. Cross-site scripting
2. Cross-site request forgery
3. Cross-site script inclusion
4. Flaws in authetication and authorization mechanisms
5. Server-side code execution or command injection bugs.

The following would lead to disqualification in the bug bounty program:
1. Attacks against Google corporate infrastructure
2. Social engineering and attacks on physical facilities
3. Brute-force denial of service bugs
4. SEO techniques
5. Vulnerabilities in non-web applications
6. Vulnerabilities in Google-branded services operated by third parties.

Reward Amounts offer by Google:

Other highly sensitive services [1]
Normal Google applications
Non-integrated acquisitions and other lower priority sites [2]
Remote code execution
$20,000
$20,000
$20,000
$5,000
SQL injection or equivalent
$10,000
$10,000
$10,000
$5,000
Significant authentication bypass or information leak
$10,000
$5,000
$1,337
$500
Typical XSS
$3,133.7
$1,337
$500
$100
XSRF, XSSI, and other common web flaws
$500 - $3,133.7
(depending on impact)
$500 - $1,337
(depending on impact)
$500
$100

You can send your report to security@google.com.



0 comments:

Post a Comment

 

Get Latest Updates: Subscribe Now | Like Us on Facebook

X