In a bid to compensate security researchers for disclosing existing flaws and to also safeguard their system, giant tech companies like Google and Facebook uses the bug bounty program. Where many hackers are empowered with thousands of dollars.
![google bug bounty](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0Ot_sz42ArzYndeUEth0cFW2HUo4vpR7ZgVTksdNep5P_yw0meEPNsc-tcreoHC1hmduAVFkESnU_NNjmLhOyBj4ES7chbhGplN05CzjZ0ixUgmo6XSuu64c3JXLjfN7_GOmaa0chE2A/s320/google+bug+bounty.jpg)
Reports released last year, by Google, shows that hackers were rewarded $3 million throughout 2016. Now, the latest on the list is a Uruguayan student who was rewarded with $10,000 for discovering a vulnerability in Google.
According to Ezequiel Pereira, he was playing with Google services using a web security testing tool known as Burp Suite when he found the vulnerability. Afer many failed attempts, he discovered that the internal web page of yaqs.googleplex.com, which hosts several Google App Engine applications, didn’t have the username or password check in place.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIMe17sV9wxd-lDiTsfp6mAOKOxdQtWq2Gp8p62MEo56nnNa4riotPSnfbnu3SXH8x-J7oK-WA0A8fA8sU-jBNh7n5CLgVBGcu3HJNPl1cWXPi0B2CtPN5qQ-MtXYwaojGDIoAwA9AUpU/s320/google+bug+bounty.jpg)
Google’s security team confirmed the efficasy of the reported bug. However, the vulnerability has been resolved. Meanwhile, screenshots of the email exchanges with Google’s security team was shared by Ezequiel the same day. Also saying he was very surprised when he received $10,000 from Google team for his work after a month.
![google bug bounty](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0Ot_sz42ArzYndeUEth0cFW2HUo4vpR7ZgVTksdNep5P_yw0meEPNsc-tcreoHC1hmduAVFkESnU_NNjmLhOyBj4ES7chbhGplN05CzjZ0ixUgmo6XSuu64c3JXLjfN7_GOmaa0chE2A/s320/google+bug+bounty.jpg)
Reports released last year, by Google, shows that hackers were rewarded $3 million throughout 2016. Now, the latest on the list is a Uruguayan student who was rewarded with $10,000 for discovering a vulnerability in Google.
According to Ezequiel Pereira, he was playing with Google services using a web security testing tool known as Burp Suite when he found the vulnerability. Afer many failed attempts, he discovered that the internal web page of yaqs.googleplex.com, which hosts several Google App Engine applications, didn’t have the username or password check in place.
“The website’s homepage redirected me to “/eng”, and that page was pretty interesting, it had many links to different sections about Google services and infrastructure, but before I visited any section, I read something in the footer: “Google ConfidentialEzequiel Pereira wrote.
“At that point I stopped poking at the website and reported the issue right away, without even thinking of a better way to show the vulnerability than with Burp.”
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIMe17sV9wxd-lDiTsfp6mAOKOxdQtWq2Gp8p62MEo56nnNa4riotPSnfbnu3SXH8x-J7oK-WA0A8fA8sU-jBNh7n5CLgVBGcu3HJNPl1cWXPi0B2CtPN5qQ-MtXYwaojGDIoAwA9AUpU/s320/google+bug+bounty.jpg)
Google’s security team confirmed the efficasy of the reported bug. However, the vulnerability has been resolved. Meanwhile, screenshots of the email exchanges with Google’s security team was shared by Ezequiel the same day. Also saying he was very surprised when he received $10,000 from Google team for his work after a month.
Copy the link below and Share with your Friends:
No comments:
Post a Comment