Bounties

HTTP(S) Service Pentesting Guide | Content Bounty

Summary

Content – We’re looking for a comprehensive HTTP service pentesting guide. Further details can be found in the requirements section.

Max Number of Submissions to be Accepted – 2

Minimum Payout – $10

Discretionary Payout – $20

Payment Method – Paypal

Requirements

  • Must show testing and exploitation of Apache and two other HTTP servers.
  • Must show the usage of at least 3 tools for minimum credit.
  • Screenshots showing key stages must be included.
  • May explore fuzzing and exploit development for additional discretionary payout.
  • Additional technical depth with respect to how common attacks work (and their flaws + countermeasures) is appreciated.
  • All submissions should be emailed to ‘[email protected]’ in .docx format.
  • Submissions may include the name of the contributor to be credited along with a website or social media link.

For faster payment in the event of your submission being accepted, you may include your paypal email in the submission email.

This post will be removed when we are no longer accepting submissions.

read more

WordPress Pentesting Guide | Content Bounty

Summary

Content – We’re looking for a comprehensive WordPress Pentesting guide. Further details can be found in the requirements section.

Max Number of Submissions to be Accepted – 2

Minimum Payout – $15

Discretionary Payout – $25

Payment Method – Paypal

Requirements

  • Must account for a range of levels of WordPress sercurity and how steps would vary to account for this.
  • Must show the usage of at least 3 tools for minimum credit.
  • Screenshots showing key stages must be included.
  • Should showcase a ‘standard’ approach using SQLi, XSS and scanning tools along with at least one theme and at least one plugin exploit. May explore fuzzing and exploit development for additional discretionary payout.
  • Additional technical depth with respect to how common attacks work (and their flaws + countermeasures) is appreciated.
  • All submissions should be emailed to ‘[email protected]’ in .docx format.
  • Submissions may include the name of the contributor to be credited along with a link to their site or social media.

For faster payment in the event of your submission being accepted, you may include your paypal email in the submission email.

This post will be removed when we are no longer accepting submissions.

read more

SSH Pentesting Guide | Content Bounty

Summary

Content – We’re looking for a comprehensive SSH pentesting guide. Further details can be found in the requirements section.

Max Number of Submissions to be Accepted – 2

Minimum Payout – $10

Discretionary Payout – $20

Payment Method – Paypal

Requirements

  • Must account for a range of levels of SSH sercurity.
  • Must show the usage of at least 3 tools for minimum credit.
  • Screenshots showing key stages must be included.
  • Should showcase both a generic password guessing approach and usage of one or more exploits. May explore fuzzing and exploit development for additional discretionary payout.
  • Additional technical depth with respect to how common attacks work (and their flaws + countermeasures) is appreciated.
  • All submissions should be emailed to ‘[email protected]’ in .docx format.
  • Submissions may include the name of the contributor to be credited along with a link to their site or social media.

For faster payment in the event of your submission being accepted, you may include your paypal email in the submission email.

This post will be removed when we are no longer accepting submissions.

read more

FTP Pentesting Guide | Content Bounty

Summary

Content – We’re looking for a comprehensive FTP pentesting guide. Further details can be found in the requirements section.

Max Number of Submissions to be Accepted – 2

Minimum Payout – $10

Discretionary Payout – $20

Payment Method – Paypal

Requirements

  • Must account for a range of levels of FTP sercurity.
  • Must show the usage of at least 3 tools for minimum credit.
  • Screenshots showing key stages must be included.
  • Should showcase both a generic password guessing approach and usage of one or more exploits. May explore fuzzing and exploit development for additional discretionary payout.
  • Additional technical depth with respect to how common attacks work (and their flaws + countermeasures) is appreciated.
  • All submissions should be emailed to ‘[email protected]’ in .docx format.
  • Submissions may include the name of the contributor to be credited along with a link to their site or social media.

For faster payment in the event of your submission being accepted, you may include your paypal email in the submission email.

This post will be removed when we are no longer accepting submissions.

read more