Penetration testing
Rules of engagement
Exploiting vulnerabilities
The process
Responsible disclosure program
It takes time to fix a vulnerability– Software changes, testing, deployment, etc.
* Bug bounty programs– A reward for discovering vulnerabilities– Earn money for hacking a system– Document the vulnerability to earn cash
* A controlled information release– Researcher reports the vulnerability– Manufacturer creates a fix– The vulnerability is announced publicly