8000 link to 1 pager article on hacker powered vs traditional pen testing · ShellInjector/docs.hackerone.com@8dfec12 · GitHub
[go: up one dir, main page]

Skip to content

Commit 8dfec12

Browse files
authored
link to 1 pager article on hacker powered vs traditional pen testing
1 parent c18527c commit 8dfec12

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/programs/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,17 +12,17 @@ HackerOne offers 3 different products that you can choose from:
1212
* HackerOne Bounty
1313

1414
### HackerOne Response
15-
Establish an ISO 29147 compliant disclosure policy to safely receive and act on vulnerabilities discovered by external third-parties. This welcomes a "See Something, Say Something" process that helps ensure that security reports end up with your security team instead of unreliable channels like social media. [Try Response](https://www.hackerone.com/product/response).
15+
Establish an ISO 29147 compliant disclosure policy to safely receive and act on vulnerabilities discovered by external third-parties. This welcomes a "See Something, Say Something" process that helps ensure that security reports end up with your security team instead of unreliable channels like social media.
1616

1717
![overview-2](./images/overview-2.png)
1818

1919
### HackerOne Challenge
20-
A private, project-based, and time-bound vulnerability assessment program. Challenges are perfect for organizations looking to supplement or replace traditional penetration tests with ethical hackers looking for severe vulnerabilities. Every Challenge includes a detailed report to help meet compliance requirements. [Try a Challenge](https://www.hackerone.com/product/challenge).
20+
A private, project-based, and time-bound vulnerability assessment program. Challenges are perfect for organizations looking to supplement or replace traditional penetration tests with ethical hackers looking for severe vulnerabilities. Every Challenge includes a detailed report to help meet compliance requirements. [Learn more](https://www.hackerone.com/sites/default/files/2017-12/Traditional%20Pentesting%20versus%20Hacker-Powerd%20Pentesting.pdf) about hacker-powered pen testing versus traditional pen testing.
2121

2222
![overview-1](./images/overview-1.png)
2323

2424
### HackerOne Bounty
25-
A program where trusted hackers are incentivized to continuously test for critical vulnerabilities. Bounty programs can be private and invite-only or fully public, and all incentives will reflect the organization’s priorities. [Try Bounty](https://www.hackerone.com/product/bounty).
25+
A program where trusted hackers are incentivized to continuously test for critical vulnerabilities. Bounty programs can be private and invite-only or fully public, and all incentives will reflect the organization’s priorities.
2626

2727
![overview-3](./images/overview-3.png)
2828

0 commit comments

Comments
 (0)
0