Feeds

Pen tester scoops source code in bug hunt contest, has to argue for prize

What's a hacker got to do to get some recognition around here at Prezi.com?

Next gen security for virtualised datacentres

An Australian penetration tester named Shubham Shah has become the latest to complain about bug bounty programs that offer pathetic – or no – rewards.

The bounty program in question was run by Prezi, a slideware-as-a-service outfit/ The terms of the program state that only certain “ … domains (and every service accessible on them) are in the scope of the bug bounty program.”

Shah went beyond those domains but claims to have come up with the biggest prize imaginable: Prezi's source code. All of it, using the technique explained here.

He then contacted Prezi to let them know about the problem and received hearty thanks in reply.

The company then refused to reward his efforts because the domain he investigated - http://intra.prezi.com – wasn't among those listed in the competition.

That decision is rather at odds with the following statement about rewards on offer;

“If you succeed, we will give you cash. That’s right; we’ll pay cold hard currency into your bank account. Think of it as a thank you.”

Shah was eventually offered branded tat, which he rejected as inadequate payment and just not sporting.

After a lengthy correspondence (PDF) Prezi eventually did the right thing, admitting to A Bug in the Bugbounty and promising that “ from now on we will reward bug hunters who find bugs outside of the scope provided that they do not violate our users’ information and that their report triggers us to improve our code base.”

Prezi's parsimony and eventual reverse is not isolated: Yahoo! recently also made its bug bounty program more rewarding after complains from developers. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?