Feeds

Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k

Assuming Google didn't offer $20,000 for it, either

Website security in corporate America

Long-running computer security website Packet Storm has launched a bug bounty scheme to reward folks who find and report holes in software. Details of qualifying flaws will eventually be publicly disclosed.

Under the new scheme, contributors will be typically paid anywhere between a few hundred dollars and $7,000 for exploits that enable miscreants to execute arbitrary code on vulnerable systems. Holes uncovered in Adobe Reader, Adobe Flash and Internet Explorer are worth top dollar to the website. The site is not in the market for exploits that only crash computers, however.

All work will be vetted prior to payment, as an FAQ on the scheme explains:

The list of targets that we are looking for moves constantly. If you believe that you can offer us quality exploits that demonstrate proper code execution, it is worth a discussion. It is vitally important that you can articulate what is being exploited, how it is being exploited, what systems and patch levels can be exploited, and that your work is 100 per cent yours to sell. We will not accept exploits that already have public proof of concepts that provide code execution nor will we accept known plagiarized work.

Different issues and different levels of exploit offer different levels of compensation. Typical payout for a working exploit ranges from $1,000 - $7,000 USD. If you have a zero-day that you believe is worth a lot more, there is the opportunity for larger payouts, but that requires a different discussion. Nothing is off the table. That said, what is currently being solicited are code execution exploits for "0.5-day"* vulnerabilities in Microsoft Windows, Oracle Java, and more. As we will have to pay you money, we will need to know your real identity and also your complete honesty.

Several vendors including Google, Mozilla, Facebook and PayPal have offered bug bounties for security researchers who find flaws in their products or services. The money is typically paid out once the bugs are identified, fixed and patches rolled out to users. Google has been known to write cheques for $20,000.

Security technology vendors such as iDefense and HP TippingPoint's Zero-Day Initiative (ZDI) also act as middlemen between bug-hunters and big software makers, by offering researchers between $500 and $20,000 for exclusive details of security bugs. This information can be used to warn vendors and corporations of upcoming attacks, using the logic that if one researcher can find the bug and report it then so can hackers.

Buying up vulnerability information also allows, for example, HP TippingPoint's network defence products to detect and block new or anticipated assaults.

Packet Storm's bug bounty probably isn't as lucrative as the ZDI scheme, and much less what's available through underground exploit marketplaces, but it offers a more open and community-focussed exchange of research.

"The big difference between us and other bug bounties is that we're actually going to publicly release the exploit after 60 days (author-permitting) so the community can test their patches from vendors as well, instead of just hoarding it for our own personal test arsenal," Todd Jarvis, chief exec of Packet Storm Security, told El Reg. ®

Bootnote

* 0.5-day, in this context, means vulnerabilities that are publicly known but only recently patched. This is in contrast to 0-day, meaning vulnerabilities in the wild that are unpatched and unknown but exploited.

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.