{"id":16621,"date":"2024-05-29T18:09:45","date_gmt":"2024-05-29T16:09:45","guid":{"rendered":"https:\/\/immune.institute\/?p=16621"},"modified":"2025-10-07T11:32:51","modified_gmt":"2025-10-07T09:32:51","slug":"bug-bounty-hacking-etico-sin-contrato","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/bug-bounty-hacking-etico-sin-contrato\/","title":{"rendered":"Bug Bounty: ethical hacking without a contract"},"content":{"rendered":"<p class=\"wp-block-paragraph\">The <strong>ethical hacking<\/strong>also known as <em>pentesting<\/em>is a process of <strong>security assessment <\/strong>of a company through a professional. It is carried out by means of an agreement between both parties detailing the procedures to be carried out and the permissions granted to the ethical hacker to access data and systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the <em>bug bounty<\/em>?<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In a technological world, for a cybercriminal to find a loophole to access a company's files can translate into huge losses. To close these loopholes <strong>security loopholes<\/strong>ethical hacking is often used, and this is where the <em>bug bounty,<\/em> or bounty hunting, for finding flaws in cyber defences. It is a programme offered by some companies and organisations to incentivise researchers to <strong>finding and reporting vulnerabilities<\/strong> in their networks, systems and applications. The main objective is to identify and correct existing security problems before they can be exploited by cybercriminals. Researchers who discover bugs can receive financial incentives or other rewards, such as being featured in a hall of fame on company websites.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How does the <em>bug bounty<\/em> the ethical hacker?<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">For a <a href=\"https:\/\/immune.institute\/en\/blog\/hacking-etico-que-es-y-que-debo-aprender-para-ello\/\">ethical hacker<\/a>the <em>bug bounty <\/em>is a crucial opportunity to demonstrate your skills, especially if you have no formal experience in the sector. The programmes are competitive and open-ended in nature, allowing participants to <strong>show their capabilities<\/strong> in relation to other competitors. Being able to show results and procedures performed is a fundamental component for a professional of this style. The <strong>accumulated experience <\/strong>through the <em>bug bounty<\/em> can make a significant difference to a cyber security professional's CV.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why would a company consider doing <em>bug bounty<\/em>?<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Companies are considering implementing these programmes because they allow them to <strong>identify and address vulnerabilities<\/strong> more efficiently and cost-effectively than more traditional audit methods. The mobilisation of diverse and specialised talent facilitates the discovery of problems undetected by internal teams within the organisation. In addition, companies' reputations are enhanced by demonstrating how committed they are to security and transparency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Advantages of the <em>bug bounty<\/em> versus traditional reporting<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The platforms of <em>bug bounty <\/em>offer some significant advantages over the manual management of a vulnerability report:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Robust and standardised infrastructure<\/strong>They facilitate communication between professionals and companies throughout the entire process, from the publication of the offer to the management of payments and rewards.<\/li>\n\n\n\n<li><strong>Established and verified hacker communities<\/strong>They simplify the task of finding qualified talent that fits the company's needs.<\/li>\n\n\n\n<li><strong>Automated processes<\/strong>The administrative and monitoring side is automated, allowing companies to focus on problem solving rather than programme management.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Traditional reporting involves more work for both parties in all aspects, but there is one main reason why ethical hackers tend to opt for platforms: the <strong>trust<\/strong>. Sending a vulnerability report to an unsolicited company can result in an accusation of fraud or deception that could damage the professional's reputation. The use of a platform offers a degree of security to both parties - the company is looking for that report and the hacker can submit a report without fear of legal reprisals or accusations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>HackerOne, the most famous platform of <em>bug bounty<\/em><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.hackerone.com\/\" target=\"_blank\" rel=\"noopener\">HackerOne<\/a> is one of the platforms most chosen by companies and ethical hackers for the practice of <em>bug bounty<\/em> at a global level. In it, we can find the programmes of corporations such as Amazon, LinkedIn or Epic Games, among others. Each company registered on the platform defines <strong>scope, rules and rewards <\/strong>depending on the specific vulnerabilities found. The practitioner can then decide which programmes they are interested in and proceed to look for weaknesses to include in their standardised report. If the company confirms the <strong>vulnerabilities<\/strong>The hacker will be rewarded as stated in the announcement.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1000\" height=\"467\" src=\"https:\/\/principal.immune.institute\/wp-content\/uploads\/2024\/05\/Programas-de-bug-bounty-en-HackerOne.png\" alt=\"\" class=\"wp-image-16623\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2024\/05\/Programas-de-bug-bounty-en-HackerOne.png 1000w, https:\/\/immune.institute\/wp-content\/uploads\/2024\/05\/Programas-de-bug-bounty-en-HackerOne-256x120.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2024\/05\/Programas-de-bug-bounty-en-HackerOne-512x239.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2024\/05\/Programas-de-bug-bounty-en-HackerOne-768x359.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2024\/05\/Programas-de-bug-bounty-en-HackerOne-18x8.png 18w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Example overview of bug bounty programmes within HackerOne (<\/em><a href=\"https:\/\/www.getapp.es\/software\/2039671\/hackerone\" target=\"_blank\" rel=\"noopener\"><em>source<\/em><\/a><em>)<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In short, the <em>bug bounty<\/em> is an invaluable tool for an ethical hacker, especially those who are just starting out or who want to practice their skills in a secure way. The automation of management processes facilitates communication between the professional and the company, as well as leading to an increase in trust, improving the experience for both.<\/p>","protected":false},"excerpt":{"rendered":"<p>El hacking \u00e9tico, tambi\u00e9n conocido como pentesting, es un proceso de evaluaci\u00f3n de la seguridad de una empresa a trav\u00e9s de un profesional. Se lleva a cabo mediante un acuerdo entre ambas partes en el que se detallan los procedimientos a realizar y los permisos que se le conceden al hacker \u00e9tico para acceder a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":12354,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-16621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/16621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=16621"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/16621\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/12354"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=16621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=16621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=16621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}