https://breachlevelindex.com
https://www.reddit.com/r/programming/comments/a1gbqw/ebay_japan_source_leak_as
_git_folder_deployed_to/?st=JP338IWS&sh=7ed38358
LOUIS CREMEN
https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700
yelp
Code
Review
Security
Tests
Análise de
Vulnera-
bilidade
Pentest
Red
Team
Theat
Hunting
Vulnerability
Disclosure
Bug
Bounty
Code
Review
Security
Tests
Análise de
Vulnera-
bilidade
Pentest
Red
Team
Theat
Hunting
Vulnerability
Disclosure
Bug
Bounty
Fonte:IBM
Code
Review
Security
Tests
Análise de
Vulnera-
bilidade
•
•
•
•
•
•
LOUIS CREMEN
https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700
Pentest
•
•
•
•
•
•
Pentest
•
•
https://www.pcisecuritystandards.org/documents/Penetration_Testing_Gui
dance_March_2015.pdf
Red
Team
•
•
•
•
•
Theat
Hunting
•
•
•
•
Vulnerability
Disclosure
Bug
Bounty
•
•
•
•
•
•
•
•
•
•
•
Fonte: Bugcrowd
•
•
•
VRP
Vulnerabilidades
encontradas pelo melhor
pesquisador interno
Vulnerabilidades
encontradas pelo
programa de Bug Bounty
Chrome 263 371
Firefox 48 148
https://mfinifter.github.io/papers/vrps-usenix2013.pdf
https://pt-br.facebook.com/whitehat
https://www.google.com/about/appsecurity/reward-program/
•
•
Hackerone
•
https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-
with-red-and-blue-security-teams-6437c1a07700
•
https://anchisesbr.blogspot.com/2018/07/seguranca-custo-de-corrigir-os.html
•
http://blog.elevenpaths.com/2018/07/bug-bounty-ciberseguridad.html
•
https://mfinifter.github.io/papers/vrps-usenix2013.pdf
•
https://engineering.checkr.com/3-lessons-from-building-our-first-bug-bounty-
program-e73f49b9f1a7
Segurança além do Pentest
Segurança além do Pentest

Segurança além do Pentest

Editor's Notes

  • #2 "Indo além do Pentest" Muito se fala hoje em dia do Pentest, que já se tornou uma prática comum quando as empresas precisam testar a segurança de um site ou aplicação. A quantidade frequente de ataques bem sucedidos, resultando em fraudes e vazamentos de dados, mostram entretando que as empresas estão falhando em manter a segurança de seus sites, aplicações e bases de dados. Embora o "pentest" seja uma técnica muito comum de testar a segurança de um site, hoje temos a disposição um conjunto de ações que podem e devem ser adotadas de forma complementar para testar e corrigir aplicações desde a sua concepção até a produção. Vamos conversar um pouco sobre as diferenças e vantagens de adotar práticas de testes de segurança, scan de vulnerabilidades, pentest, políticas de vulnerability disclosure e programas de bug bounty.
  • #3 https://breachlevelindex.com
  • #4 https://g1.globo.com/economia/tecnologia/noticia/2018/11/30/vazamento-de-dados-dos-hoteis-marriott-pode-ter-afetado-500-milhoes-de-clientes-diz-a-rede.ghtml
  • #5  https://www.reddit.com/r/programming/comments/a1gbqw/ebay_japan_source_leak_as_git_folder_deployed_to/?st=JP338IWS&sh=7ed38358
  • #7 https://ww2.bugcrowd.com/rs/453-IJC-858/images/why-crowdsourced-security-bugcrowd-032118.pdf
  • #8 https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700
  • #11 https://www.news18.com/news/buzz/yelp-tried-to-remove-bugs-on-app-artificial-intelligence-deleted-everything-2003957.html
  • #14 https://www.isixsigma.com/industries/software-it/defect-prevention-reducing-costs-and-enhancing-quality/
  • #17 https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700
  • #19 https://kirkpatrickprice.com/blog/new-pci-requirement-11-3-4-1-new-penetration-testing-requirements/ https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf
  • #24 https://giphy.com/gifs/fire-guns-how-to-MhenSeT9i5Mnm Flexa https://giphy.com/gifs/animated-rambo-gifmania-2c8lcLAcJAPHq
  • #25 Fonte: Bugcrowd
  • #26 If we consider that an average North American developer on a browser security team (i.e., that of Chrome or Firefox) would cost the vendor around $500 per day (assuming a $100,000 salary with a 50% over- head), we see that the cost of either of these VRPs is comparable to the cost of just one member of the browser security team. On the other hand, the benefit of a VRP far outweighs that of a single security researcher because each of these VRPs finds many more vulnerabilities than any one researcher is likely to be able to find. For bugs affecting stable releases, the Chrome VRP has paid 371 bounties, and the most prolific internal security researcher has found 263 vulnerabilities. For Firefox, these numbers are 148 and 48, respectively. Based on this simple cost/benefit analysis, we hypothesize that: A VRP can be a cost-effective mechanism for finding security vulnerabilities. https://mfinifter.github.io/papers/vrps-usenix2013.pdf
  • #28 https://pt-br.facebook.com/whitehat https://pt-br.facebook.com/BugBounty/
  • #29 https://www.google.com/about/appsecurity/reward-program/
  • #30 In the first 3 months of their public VDP being listed on HackerOne, Goldman Sachs resolved 20 vulnerabilities and thanked 9 hackers. 27.5% of bugs affecting Chrome releases originate from VRP contributions (371 of 1347), and 24.1% of bugs affecting Firefox releases (148 of 613) result from VRP contributions. https://mfinifter.github.io/papers/vrps-usenix2013.pdf