Changed bug bounty URL (#27457)

Pointed it back at the guide for the "Bug Bounty" category instead of wikipedia. Will move the wikipedia link to the bug bounty page.
pull/33514/head^2
The Archangel 2019-03-04 20:00:01 -05:00 committed by Randell Dawson
parent 4f1fb17b37
commit 1b4ce7e188
1 changed files with 1 additions and 1 deletions

View File

@ -10,7 +10,7 @@ Before doing a penetration test, it is mandatory to have an agreement that will
- where will be the IP source of the attack, and - where will be the IP source of the attack, and
- what will be the penetration fields of the system. - what will be the penetration fields of the system.
Penetration testing without authorization is illegal, so it is very important to have this signed agreement before starting any work. Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible. Many big companies offer rewards for anybody that can point out security vulnerabilities in their systems, through what is called [bug bounty programs](https://en.wikipedia.org/wiki/Bug_bounty_program). Google, for example, will offer tens of thousands of dollars through their Vulnerability Reward Program. Penetration testing without authorization is illegal, so it is very important to have this signed agreement before starting any work. Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible. Many big companies offer rewards for anybody that can point out security vulnerabilities in their systems, through what is called [bug bounty programs](https://guide.freecodecamp.org/security/bug-bounties). Google, for example, will offer tens of thousands of dollars through their Vulnerability Reward Program.
## Phases of Penetration Testing ## Phases of Penetration Testing