Why would you try to find vulnerabilities and exploits on a domain without having explicit authorization instead of going through a bug bounty program?
I've seen a couple of posts recently talking about vulnerabilities they found on a website they didn't have authorization to pentest and wondering what they should do with this information.
I think this is kinda problematic since asking for compensation in exchange of the solution is considered extortion.
Could there be any advantages doing it this way instead of a bug bounty program? For example a bigger reward?
[link] [comments]
from hacking: security in practice https://ift.tt/Q3Zwaq4
Comments
Post a Comment