skip to Main Content

Guest Blog: Writing Up a POC by Planet Zuda

Republished with permission from: http://planetzuda.com/2014/12/29/how-to-write-a-good-proof-of-concept-for-security-holes/ How To Write a Proof Of Concept For Security Holes December 29, 2014 by Planet Zuda   We find security bugs all the time and have to write proof of concepts. Unfortunately, we struggled with being able to…

Read More

Is the Heartbleed Exploit Out Yet?

In short, Yes. A list of POCs are provided below. If we're missing anything let us know via Twitter @bugcrowd, and we'll add it to the list and credit you for helping out. Last update: 30 April 2014 6:07 PDT Unless…

Read More

When to Reward a Bug Bounty Submission

We’re regularly asked how Bugcrowd determines if a bug bounty submission is rewardable. Today, as we approach 10,000 submissions, and as part of Bugcrowd’s commitment to transparency, we’re shedding some light on our submission evaluation process. Its important to note…

Read More

Guest Blog: Breaking Bugcrowd’s Captcha by Pwndizzle

Check our his profile here: https://bugcrowd.com/pwndizzle Blog: http://pwndizzle.blogspot.com Twitter: @pwndizzle Introduction A while back Bugcrowd started a bounty for the main Bugcrowd site. While flicking through the site looking for issues I noticed they were using a pretty basic CAPTCHA. In certain sections…

Read More
Learn More About The Most Critical Vulnerabilities of 2019Download Report
+
Back To Top