Throughout October, November and December 2016, we challenged our crowd to submit bugs against some challenging targets–thick client applications. Previously we announced our October and November winners and today we’re excited to announce our two final two winners:
Congratulations to our winner for the month of December, @ctus, and to our final winner, @Mongoxgas.
Our response to the promotion was so positive, we’ve decided to extend it until March 2017–and have increased the reward pool! Check out the details below for all the good stuff.
From January 1st through March 31st, every valid and non-duplicate vulnerability submitted against thick client targets will be entered a drawing for a total of $2500 cash prizes.
Email us at support@bugcrowd.com and let us know that you are interested in thick client software testing!
Start testing on the following public programs that are running:
New to thick client software testing? Let us know in your email and we’d be happy to send you some online resources to help you get started. Our Application Security Engineering team put together their favorite go-to resources, like Hacking – the Art of Exploitation (2nd edition) or Hacker Disassembling Uncovered. Want to try out some of your new skills before you tackle a bounty? Try the Embedded Security CTF!
Feel free to reach out to support@bugcrowd.com with any additional questions.
Happy Hunting!!