Difference between revisions of "The Bug Bash"
From BruCON 2017
(One intermediate revision by the same user not shown) | |||
Line 8: | Line 8: | ||
2 sessions are scheduled on [http://sched.co/X4q8fG Wednesday] and [http://sched.co/X4pMWv Thursday] evening! | 2 sessions are scheduled on [http://sched.co/X4q8fG Wednesday] and [http://sched.co/X4pMWv Thursday] evening! | ||
+ | |||
+ | |||
+ | [http://www.eurotrashsecurity.eu/ EurotrashSecurity] podcast featuring Marisa Fagan ([http://twitter.com/dewzi @dewzi]) from [http://bugcrowd.com/ Bugcrowd] about the upcoming "Bug Bash" events at OWASP AppSec USA and BruCON [http://soundcloud.com/eurotrashsecurity/microtrash38-bugcrowds-bug-bash >HERE<] | ||
+ | |||
+ | |||
[[File:Bugcrowd-logo.jpg|200px|link=http://bugcrowd.com/]] | [[File:Bugcrowd-logo.jpg|200px|link=http://bugcrowd.com/]] |
Latest revision as of 09:57, 12 September 2014
The Bug Bash is an application security hackathon where the targets are live applications and the prizes are real cash bounties!
Bugcrowd hosts multiple well-known Bug Bounty Programs on their Crowdcontrol platform. They've created an event where conference attendees get together in a room to hack together and learn about penetration testing and application security auditing, with the chance to win cash when they find a security vulnerability. Create a team to increase your chances of being the first to find bugs!
To participate, sign up for a tester account on bugcrowd.com. If you have a team, create an account for the team and choose a team captain to maintain it. You do not need to sign up in advance, just show up to the event with your computer and join in on the fun! We'll have snacks and drinks, as well as some presentations with tips on how to win bounties. Prizes range from swag to cash, from $50 to $5,000!
We'll see you there! #jointhehunt
2 sessions are scheduled on Wednesday and Thursday evening!
EurotrashSecurity podcast featuring Marisa Fagan (@dewzi) from Bugcrowd about the upcoming "Bug Bash" events at OWASP AppSec USA and BruCON >HERE<