SlideShare a Scribd company logo
‹#›
State of Bug Bounty
Leif Dreizler, Sr. Security Engineer
@leifdreizler
‹#›
Things I’ll Cover
oBug Bounty: 👻 🎁🔮
oPro tips, pitfalls, war stories
oQuestions!
What’s a bug bounty
program?
‹#›
A Brief History of
Bug Bounty
Programs
‹#›
1995
‹#›
20052002
‹#›
2004
‹#›
2007
‹#›
Big	Data	Security	Metrics
9
‹#›
Highlights	from	the	2014	Google	
o Started in 2010
o In 2014 paid over 200 researchers
o Highest single payout: $150k
o Total payout: $1.5+ million
o Over 500 unique and valid bugs
o Over half of the bugs in Chrome were reported and fixed in
beta or dev builds
src: http://googleonlinesecurity.blogspot.com/2015/01/security-reward-programs-year-in-review.html
‹#›
Google VRP
src:	h?ps://sites.google.com/site/bughunteruniversity/behind-the-scenes/charts
‹#›
‹#›
Highlights from the 2014 Facebook Report
o Started in 2011
o Currently $500 minimum, no
defined maximum
o 17,011 Submissions
o 61 Eligible bugs were high severity
o 123 Countries (65 Rewarded)
o $1.3 million paid to 321
researchers
Countries with High # of Valid Subs
Valid Bugs Average $
RewardIndia 196 $1,343
Egypt 81 $1,220
USA 61 $2,470
UK 28 $2,768
Philippines 27 $1,093
src: https://www.facebook.com/notes/facebook-bug-bounty/2014-highlights-bounties-get-better-than-ever/1026610350686524
‹#›
Microsoft Bounty Expansion
o Started in 2013
o Online services like Azure and 0365 have a
maximum bounty of $15k
o Doubled this during Aug 5 - Oct 5 for auth
vulnerabilities in Windows Live
o “Mitigation Bypass” bounty for novel methods to
bypass paramount OS protections like ASLR and
DEP - $100k
o “Bonus Bounty for Defense” - $50k
src: http://blogs.technet.com/b/msrc/archive/2015/04/22/microsoft-bounty-programs-expansion-azure-and-project-spartan.aspx
src: https://technet.microsoft.com/en-us/security/dn800983
‹#›
Highlights from the 2014 Github Report
o First year of the program
o $200 - $5,000 (doubled for 2015)
o 1,920 Submissions
o 73 Unique Vulnerabilities (57 medium/high)
o 33 Unique Researchers earned a total of
$50,100 for the med/high vulnerabilities
src:	h?ps://github.com/blog/1951-github-security-bug-bounty-program-turns-one
‹#›
Tesla Motors
o Began their program with Bugcrowd in 2015
o Includes all Tesla Motors hosts, mobile apps, and any hardware
you’re authorized to test against (don’t hack your neighbors car)
o Initially had an upper end of $1,000
o Increased the upper end to $10k at Black Hat
o Researchers were able to gain access to the Model S
computer system, remotely lock and unlock the car, and apply
the emergency brake if under 5 m.p.h.
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work with
them
oMakes it easy for researchers to “do the right
thing”
oThe program makes a statement
oContinuous testing
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work with
them
oMakes it easy for researchers to “do the right
thing”
oThe program makes a statement
oContinuous testing
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work
with them
oMakes it easy for researchers to “do the right
thing”
oThe program makes a statement
oContinuous testing
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work with
them
oMakes it easy for researchers to “do the
right thing”
oThe program makes a statement
oContinuous testing
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work with
them
oMakes it easy for researchers to “do the right
thing”
oThe program makes a statement
oContinuous testing
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work with
them
oMakes it easy for researchers to “do the right
thing”
oThe program makes a statement
oContinuous testing
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work with
them
oMakes it easy for researchers to “do the right
thing”
oThe program makes a statement
oContinuous testing
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work with
them
oMakes it easy for researchers to “do the right
thing”
oThe program makes a statement
oContinuous testing
‹#›
Why should my organization run a bug bounty?
oHelps augment your internal security team
oHelps level the playing field
oShows the security community you’ll work with
them
oMakes it easy for researchers to “do the right
thing”
oThe program makes a statement
oContinuous testing
‹#›
I’m	already	doing	enough
oRed Team
oScanners
oTraditional Pentests
‹#›
I’m already getting continuous testing from my red team
oBug bounties don’t replace red teams
oThey work in concert, providing a different
perspective
oRed teams have access to privileged information that
may create bias in their testing
‹#›
I’m already getting continuous testing from my red team
oBug bounties don’t replace red teams
oThey work in concert, providing a different
perspective
oRed teams have access to privileged information that
may create bias in their testing
‹#›
I’m already getting continuous testing from a scanner
oThey report false positives
oScanners miss a lot of
vulnerabilities
‹#›
I’m already having my application pen tested
oLimited resources compared to the
crowd
oPaying for time vs. results
oSnapshot in time
‹#›
src:	h?ps://github.com/blog/1951-github-security-bug-bounty-program-turns-one
Github	Program	Lifecycle
‹#›
Community	Management
oDeluge of submissions
oTriage and Validation
oResearcher Communication
oResearcher Payment
oRemediation
‹#›
Community	Management
oDeluge of submissions
oTriage and Validation
oResearcher Communication
oResearcher Payment
oRemediation
‹#›
Community	Management
oDeluge of submissions
oTriage and Validation
oResearcher Communication
oResearcher Payment
oRemediation
‹#›
Program	Growth	
oIncrease number of researchers
oIncrease scope
oIncrease reward ranges
oIncrease publicity
‹#›
January 2013 - June 2015
State of Bug Bounty
36
‹#›
Areas	of	Trends:	
Types	of	Programs	
Signal	to	Noise	RaSo	
Severity	of	Submissions	
Types	of	Submissions	
Researcher	Demographics	&	Behavior
CulminaSon	of	2	Years	of	Bug	Bounty	Data
37
‹#›
Researchers	are	measured	on	the	below	factors	and	invited	
accordingly…	
Quality		 	 if	a	submission	is	valid	and	in	scope	
Impact		 	 if	a	submission	is	worth	your	Sme	
AcSvity		 	 if	a	researcher	is	ready	to	work	
Trust	 	 	 	 	
How	do	researchers	join	private	programs?
‹#›
» Valid	
» Fixable	
» High-Priority	
» Reproducible	
» In	Scope
NoiseSignal
» Invalid	
» Ignored	
» Duplicate	
» Non-Reproducibl
» Out-of-Scope
Why	Invite	Only?
‹#›
Program Statistics
o $725k paid to researchers
o 38k submissions
o 8k valid & unique (21%)
o $200 average payout
o 4.39 “big bugs” per program
‹#›
P1 - Critical
Vulnerabilities that cause a privilege
escalation on the platform from
unprivileged to admin, allows remote
code execution, financial theft, etc.
Examples: Vertical Authentication
bypass, SSRF, XXE, SQL injection,
User Authentication bypass
P2 - High
Vulnerabilities that affect the security
of the platform including the
processes it supports.
Examples: Lateral authentication
bypass, Stored XSS, some CSRF
depending on impact
What	are	big	bugs?
‹#›
src:	h?ps://sites.google.com/site/bughunteruniversity/behind-the-scenes/charts		
Google VRP
‹#›
43
src:	h?ps://sites.google.com/site/bughunteruniversity/behind-the-scenes/charts		
Google VRP
‹#›
How to reduce noise
o Provide clear directives to researchers
o What’s in/out of scope
o Play by your own rules
o Reward Quickly and Consistently
o Fix Quickly
o Provide feedback/education
‹#›
How to reduce noise
o Provide clear directives to researchers
o What’s in/out of scope
o Play by your own rules
o Reward Quickly and Consistently
o Fix Quickly
o Provide feedback/education
‹#›
How to reduce noise
o Provide clear directives to researchers
o What’s in/out of scope
o Play by your own rules
o Reward Quickly and Consistently
o Fix Quickly
o Provide feedback/education
‹#›
How to reduce noise
o Provide clear directives to researchers
o What’s in/out of scope
o Play by your own rules
o Reward Quickly and Consistently
o Fix Quickly
o Provide feedback/education
‹#›
How to reduce noise
o Provide clear directives to researchers
o What’s in/out of scope
o Play by your own rules
o Reward Quickly and Consistently
o Fix Quickly
o Provide feedback/education
‹#›
How to reduce noise
o Provide clear directives to researchers
o What’s in/out of scope
o Play by your own rules
o Reward Quickly and Consistently
o Fix Quickly
o Provide feedback/education
‹#›
Provide Feedback/Education
o Respond to researchers
o Improve submissions
o Note deficiencies
o Clarify scope
o Training
o Google: Bughunter University
o Facebook: Bounty Hunter’s Guide
o Bugcrowd: Bugcrowd Forum
‹#›
Shaping the Future of Bug Bounty
o Paid Summer Internships
o Guest blog posts
o Bugcrowd Forum
o Training
o https://github.com/jhaddix/tbhm
o https://www.youtube.com/watch?
v=VtFuAH19Qz0
o https://blog.bugcrowd.com/bugcrowds-2015-
guide-hacker-summer-camp/
‹#›
Shaping the Future of Bug Bounty
Bug	Bounties	as	Primary	Source	of	Income	
(Researchers	with	15+	Valid	Submissions)
‹#›
Shaping the Future of Bug Bounty
‹#›
Researcher Statistics
o 20,000 total sign ups
o 90 Countries
o India - 31%
o US - 18%
o UK - 9%
o Highest average payout
o Cyprus - $644
o Switzerland - $512
o Austria - $475
‹#›
Google VRP
55
src:	h?ps://sites.google.com/site/bughunteruniversity/behind-the-scenes/charts
‹#›
Submissions:	What	do	they	find?
‹#›
Submissions:	What	do	they	find?
‹#›
Big Bugs!
‹#›
Cross-domain	Information	Disclosure
Discovered	by	Peter	Adkins	(@Darkarnium)
‹#›
• Clifford’s first private bounty invitation
• Launched at midnight in Philippines
• Found an IDOR à elevation of privilege
• Clifford’s	first	private	bounty	invitation	
• Launched	at	midnight	in	Philippines	
• Found	an	IDOR	à elevation	of	privilege
src:	h?ps://www.cliffordtrigo.info/hijacking-smartsheet-accounts/
‹#›
src:	h?ps://www.cliffordtrigo.info/hijacking-smartsheet-accounts/
‹#›
src:	h?ps://www.cliffordtrigo.info/hijacking-smartsheet-accounts/
‹#›
h?p://nbsriharsha.blogspot.in/2015/07/a-style-of-bypassing-authenScaSon.html	
• IDOR	à elevation	of	privilege	
1)	login	to	https://service.teslamotors.com/		
2)	navigate	to	https://service.teslamotors.com/admin/bulletins		
3)	now	you	are	admin,	you	can	delete,	modify	and	publish	
documents
‹#›
In Summary
o Bug bounty programs have been around for a while
o Managing a bug bounty program can be difficult
o Security-conscious companies keep running them
o More companies are adopting (private) programs
o Researchers are reporting interesting and critical vulnerabilities
bugcrowd.comleif@bugcrowd.com921 Front Street
San Francisico, CA
@bugcrowd
QUESTIONS?

More Related Content

What's hot

Cybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician PracticesCybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician Practices
Ravi D. Goel, MD
 
Introducing HOSTING Labs - Ed Schaefer
Introducing HOSTING Labs - Ed Schaefer Introducing HOSTING Labs - Ed Schaefer
Introducing HOSTING Labs - Ed Schaefer
Hostway|HOSTING
 
OWASP, the life and the universe
OWASP, the life and the universeOWASP, the life and the universe
OWASP, the life and the universe
Sébastien GIORIA
 
Bsides Chicago2017
Bsides Chicago2017Bsides Chicago2017
Bsides Chicago2017
Paül Jaramillo
 
Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...
Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...
Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...
Bishop Fox
 
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
bugcrowd
 

What's hot (6)

Cybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician PracticesCybersecurity 101 for Ophthalmology & Physician Practices
Cybersecurity 101 for Ophthalmology & Physician Practices
 
Introducing HOSTING Labs - Ed Schaefer
Introducing HOSTING Labs - Ed Schaefer Introducing HOSTING Labs - Ed Schaefer
Introducing HOSTING Labs - Ed Schaefer
 
OWASP, the life and the universe
OWASP, the life and the universeOWASP, the life and the universe
OWASP, the life and the universe
 
Bsides Chicago2017
Bsides Chicago2017Bsides Chicago2017
Bsides Chicago2017
 
Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...
Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...
Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...
 
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
 

Viewers also liked

Timetable
TimetableTimetable
smbiz system features and functions
smbiz system features and functionssmbiz system features and functions
smbiz system features and functions
Rick Tiglao
 
1Billion+
1Billion+1Billion+
Owasp LA
Owasp LAOwasp LA
Owasp LA
leifdreizler
 
Grooming
GroomingGrooming
the_7_pervasive_whims
the_7_pervasive_whimsthe_7_pervasive_whims
the_7_pervasive_whims
Scott Byorum
 
2012_005
2012_0052012_005
Cellulosic ethanol
Cellulosic ethanolCellulosic ethanol
Cellulosic ethanol
Jonathan Boyd
 
N Diploma, Trade Tests & N4-N6
N Diploma, Trade Tests & N4-N6N Diploma, Trade Tests & N4-N6
N Diploma, Trade Tests & N4-N6Khathu Mudau
 

Viewers also liked (9)

Timetable
TimetableTimetable
Timetable
 
smbiz system features and functions
smbiz system features and functionssmbiz system features and functions
smbiz system features and functions
 
1Billion+
1Billion+1Billion+
1Billion+
 
Owasp LA
Owasp LAOwasp LA
Owasp LA
 
Grooming
GroomingGrooming
Grooming
 
the_7_pervasive_whims
the_7_pervasive_whimsthe_7_pervasive_whims
the_7_pervasive_whims
 
2012_005
2012_0052012_005
2012_005
 
Cellulosic ethanol
Cellulosic ethanolCellulosic ethanol
Cellulosic ethanol
 
N Diploma, Trade Tests & N4-N6
N Diploma, Trade Tests & N4-N6N Diploma, Trade Tests & N4-N6
N Diploma, Trade Tests & N4-N6
 

Similar to BSides LA/PDX

Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital World
qubanewmedia
 
0 for 3: Edtech Startup Lessons Learned
0 for 3: Edtech Startup Lessons Learned0 for 3: Edtech Startup Lessons Learned
0 for 3: Edtech Startup Lessons Learned
SeriousGamesAssoc
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane Lackey
Yandex
 
10 practices that every developer needs to start right now
10 practices that every developer needs to start right now10 practices that every developer needs to start right now
10 practices that every developer needs to start right now
Caleb Jenkins
 
Dev secops opsec, devsec, devops ?
Dev secops opsec, devsec, devops ?Dev secops opsec, devsec, devops ?
Dev secops opsec, devsec, devops ?
Kris Buytaert
 
Devops is a Security Requirement
Devops is a Security RequirementDevops is a Security Requirement
Devops is a Security Requirement
Kris Buytaert
 
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
centralohioissa
 
Jr devsurvivalguide
Jr devsurvivalguideJr devsurvivalguide
Jr devsurvivalguide
James York
 
Teaching Elephants to Dance (and Fly!): A Developer's Journey to Digital Tran...
Teaching Elephants to Dance (and Fly!): A Developer's Journey to Digital Tran...Teaching Elephants to Dance (and Fly!): A Developer's Journey to Digital Tran...
Teaching Elephants to Dance (and Fly!): A Developer's Journey to Digital Tran...
Burr Sutter
 
Achieving Technical Excellence in Your Software Teams - from Devternity
Achieving Technical Excellence in Your Software Teams - from Devternity Achieving Technical Excellence in Your Software Teams - from Devternity
Achieving Technical Excellence in Your Software Teams - from Devternity
Peter Gfader
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
Jerod Brennen
 
Dev and Ops Collaboration and Awareness at Etsy and Flickr
Dev and Ops Collaboration and Awareness at Etsy and FlickrDev and Ops Collaboration and Awareness at Etsy and Flickr
Dev and Ops Collaboration and Awareness at Etsy and Flickr
John Allspaw
 
Cybercrime and the developer 2021 style
Cybercrime and the developer 2021 styleCybercrime and the developer 2021 style
Cybercrime and the developer 2021 style
Steve Poole
 
How To (Not) Open Source - Javazone, Oslo 2014
How To (Not) Open Source - Javazone, Oslo 2014How To (Not) Open Source - Javazone, Oslo 2014
How To (Not) Open Source - Javazone, Oslo 2014
gdusbabek
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
Shubham Gupta
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Mohammed Adam
 
SplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics MethodsSplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics Methods
Splunk
 
Fast Delivery DevOps Israel
Fast Delivery DevOps IsraelFast Delivery DevOps Israel
Fast Delivery DevOps Israel
Adrian Cockcroft
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
Splunk
 

Similar to BSides LA/PDX (20)

Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital World
 
0 for 3: Edtech Startup Lessons Learned
0 for 3: Edtech Startup Lessons Learned0 for 3: Edtech Startup Lessons Learned
0 for 3: Edtech Startup Lessons Learned
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane Lackey
 
10 practices that every developer needs to start right now
10 practices that every developer needs to start right now10 practices that every developer needs to start right now
10 practices that every developer needs to start right now
 
Dev secops opsec, devsec, devops ?
Dev secops opsec, devsec, devops ?Dev secops opsec, devsec, devops ?
Dev secops opsec, devsec, devops ?
 
Devops is a Security Requirement
Devops is a Security RequirementDevops is a Security Requirement
Devops is a Security Requirement
 
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
Jr devsurvivalguide
Jr devsurvivalguideJr devsurvivalguide
Jr devsurvivalguide
 
Teaching Elephants to Dance (and Fly!): A Developer's Journey to Digital Tran...
Teaching Elephants to Dance (and Fly!): A Developer's Journey to Digital Tran...Teaching Elephants to Dance (and Fly!): A Developer's Journey to Digital Tran...
Teaching Elephants to Dance (and Fly!): A Developer's Journey to Digital Tran...
 
Achieving Technical Excellence in Your Software Teams - from Devternity
Achieving Technical Excellence in Your Software Teams - from Devternity Achieving Technical Excellence in Your Software Teams - from Devternity
Achieving Technical Excellence in Your Software Teams - from Devternity
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
Dev and Ops Collaboration and Awareness at Etsy and Flickr
Dev and Ops Collaboration and Awareness at Etsy and FlickrDev and Ops Collaboration and Awareness at Etsy and Flickr
Dev and Ops Collaboration and Awareness at Etsy and Flickr
 
Cybercrime and the developer 2021 style
Cybercrime and the developer 2021 styleCybercrime and the developer 2021 style
Cybercrime and the developer 2021 style
 
How To (Not) Open Source - Javazone, Oslo 2014
How To (Not) Open Source - Javazone, Oslo 2014How To (Not) Open Source - Javazone, Oslo 2014
How To (Not) Open Source - Javazone, Oslo 2014
 
Bug Bounty - Play For Money
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
SplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics MethodsSplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics Methods
 
Fast Delivery DevOps Israel
Fast Delivery DevOps IsraelFast Delivery DevOps Israel
Fast Delivery DevOps Israel
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
 

Recently uploaded

PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 

Recently uploaded (20)

PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 

BSides LA/PDX