8000 Merge pull request #54 from Hacker0x01/retesting · hacker0x011/docs.hackerone.com@ca81682 · GitHub
[go: up one dir, main page]

Skip to content

Commit ca81682

Browse files
authored
Merge pull request Hacker0x01#54 from Hacker0x01/retesting
retesting
2 parents 75c35cf + 02e2f0f commit ca81682

File tree

5 files changed

+97
-1
lines changed

5 files changed

+97
-1
lines changed

docs/hackers/images/retesting-5.png

30.7 KB
Loading

docs/hackers/retesting.md

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
title: "Retesting (beta)"
3+
path: "/hackers/retesting.html"
4+
id: "hackers/retesting"
5+
---
6+
7+
As programs receive vulnerability reports and work on deploying fixes, they need proof that their vulnerabilities have actually been fixed. Asking hackers to verify whether a vulnerability has been fixed is a good way to secure the protection of data. Programs can elect to invite you and other hackers to retest your vulnerabilities to verify fixes.
8+
9+
<i>This is a new feature that is currently in the beta phase and only select programs are testing this feature out. If you’re a part of those programs, you may be invited to retest the vulnerability fixes. There’s currently no effect to reputation for participating in the retest, and there’s also no time limit to complete it.</i>
10+
11+
If you’re invited to retest a vulnerability, you’ll receive an invitation in your email to retest the report.
12+
13+
![retesting-5](./images/retesting-5.png)
14+
15+
To participate in the retest:
16+
1. Click <b>View retest<./b> in your email.
17+
2. Familiarize yourself with the contents of the report and check to see that the vulnerability has been fixed.
18+
3. Click the <b>answer these questions<b> link in the report banner or just scroll to the bottom of the report to access the questionnaire.
19+
20+
![retesting-1](./images/retesting-1.png)
21+
22+
4. Answer these questions in the questionnaire:
23+
* Are you able to reproduce the vulnerability?
24+
* Are you able to identify a bypass to the fix?
25+
26+
![retesting-2](./images/retesting-2.png)
27+
28+
5. Submit a new report if you found a new vulnerability by clicking on the <b>submit a new report</b> link, and enter the report ID number in the <b>Report ID</b> field.
29+
30+
![retesting-3](./images/retesting-3.png)
31+
32+
6. Click <b>Submit</b>.
33+
7. Click <b>Yes!</b> to finalize your submission.
34+
35+
![retesting-4](./images/retesting-4.png)
36+
37+
Upon completion, you'll be awarded with a $100 bounty.

docs/programs/retesting.md

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: "Retesting (beta)"
3+
path: "/programs/retesting.html"
4+
id: "programs/retesting"
5+
---
6+
7+
As programs receive vulnerability reports and work on deploying fixes, they need proof that their vulnerabilities have actually been fixed. Asking hackers to verify whether a vulnerability has been fixed is a good way to secure the protection of your asset’s data. You can elect to invite hackers to retest your vulnerabilities to verify fixes. Each hacker that participates in the retest will receive a $100 bounty upon completion.
8+
9+
<i>Inviting hackers to retest your vulnerabilities is a new feature that is currently in the beta phase. To be a part of the beta testing, please reach out to your program manager.</i>
10+
11+
### Set Up
12+
There’s currently no set up on your end that’s needed to enable the feature. Your program manager will enable the feature for you.
13+
14+
### How It Works
15+
Once your program manager has enabled the feature, to have hackers retest a vulnerability:
16+
1. Choose a resolved report in your inbox that you want to assign hackers to retest.
17+
2. Change the action picker to <b>Request retest</b>.
18+
19+
![retest-1](./images/retesting-1.png)
20+
21+
3. Click <b>Request retest</b>.
22+
23+
![retest-2](./images/retesting-2.png)
24+
25+
The original reporter as well as 4 random hackers participating in your program will be invited to retest the report through email.
26+
27+
![retest-3](./images/retesting-3.png)
28+
29+
When the hacker clicks <b>View retest</b> in the email, they’ll be able to familiarize themselves with the vulnerability report and check to see that the vulnerability is properly fixed. After they’ve tested the vulnerability, they can click the <b>answer these questions</b> link in the report banner to submit their findings.
30+
31+
![retest-4](./images/retesting-4.png)
32+
33+
The hacker will be asked to answer the following questions:
34+
* Are you able to reproduce the vulnerability?
35+
* Are you able to identify a bypass to the fix?
36+
37+
![retest-5](./images/retesting-5.png)
38+
39+
If they were able to identify a bypass, they can can submit a new vulnerability report and enter the report ID in the questionnaire.
40+
41+
![retest-6](./images/retesting-6.png)
42+
43+
Upon submission of the questionnaire, you’ll be notified that a hacker has completed a retest of your report within the report timeline and also through email.
44+
45+
![retest-7](./images/retesting-7.png)
46+
47+
Click on <b>View results</b> to see the status and findings of the retest efforts. If the hacker was able to find a bypass to the vulnerability, you can view the new vulnerability report.
48+
49+
![retest-9](./images/retesting-9.png)
50+
51+
Hackers that completed the retest will automatically be awarded $100. The payment is a regular bounty payment and the transaction for retesting will show in your billing overview statement.
52+
53+
![retest-10](./images/retesting-10.png)
54+
55+
<i>There’s currently no effect to reputation for verifying vulnerability fixes and there’s also no time limit for hackers to complete the retest.</i>

src/pages/hackers/hackers-nav.yaml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232
path: /hackers/manage-notifications.html
3333
- title: Hacker Email Alias
3434
path: /hackers/hacker-email-alias.html
35-
- title: Sessions
35+
- title: Sessions
3636
path: /hackers/sessions.html
3737
- title: Two-Factor Authentication
3838
path: /hackers/two-factor-authentication.html
@@ -47,6 +47,8 @@
4747
path: /hackers/create-a-directory-page.html
4848
- title: Credentials
4949
path: /hackers/credentials.html
50+
- title: Retesting
51+
path: /hackers/retesting.html
5052
- title: Hacker101
5153
path: /hackers/hacker101.html
5254
- title: 90 Day Leaderboard

src/pages/programs/programs-nav.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,8 @@
125125
path: /programs/triggers.html
126126
- title: Hackbot
127127
path: /programs/hackbot.html
128+
- title: Retesting
129+
path: /programs/retesting.html
128130
- title: Integrations
129131
items:
130132
- title: Supported Integrations

0 commit comments

Comments
 (0)
0