We're inviting the best pwnstars, bounty hunters and contest winners from around the world to exploit a variety of targets for a chance to win US$1.5 million in cash!
We're creating a destination for bug hunters by gathering various industry partners to host their own bounty programs alongside ours with a one-stop bounty extravaganza for bug hunters!!
HITB Driven2Pwn is the UAE’s first bug bounty buffet event – a one stop collaborative bounty organized by Hack In The Box, VXRL and Vulnerability Labs.
Like a traditional bug bounty contest, we have a variety of targets with a range of cash pots to be won – so get ready to lay down your best pwnfu! You’re free to compete either as a team or as an individual hunter and there are no limits to the number of categories or bounties you can enter.
The aim of this 3-day contest is to create THE destination for the best bug bounty hunters to come and win themselves some good ol’ cash while responsibly disclosing vulnerabilities. In addition, we plan to open source all findings *
* Subject to an agreed time window during which patches can be issued before publicly disclosing the vulnerability.
Taking place alongside the inaugural HITB+CyberWeek event, Driven2Pwn will happen October 15th till the 17th (Tuesday, Wednesday and Thursday) at the Emirates Palace in Abu Dhabi.
A full schedule including time-to-pwn slots will be announced in July.
We all know that exploits are cool and such. The basis of an exploit is the underlying bug, detected by either reverse engineering or fuzzing. The process from a crash to exploit is a long one, which requires overcoming exploit mitigations, sandboxes, privileges, signatures, etc. The focus of current bug bounties is exploits only. We want to change the focus.
Bug confirmed by judging panel on-site at CyberWeek & initial findings + report submitted to vendor.
Bug finder gets paid.
+ 90 to 120 days (depending on severity)
Patch from vendor released along with initial advisory
+ 90 days for patch to be distributed
Full details of exploit including submitted exploit code is released as open source
Our rules take into consideration the industry accepted Pwn2Own approach which is already familiar to the bug hunting and bounty community.
Note: This is a coordinated disclosure competition with strong emphasis against resale of findings from the contest
Latest available build
e.g. Security Cameras / Routers / Smart Devices / Locks / Drones / Robots
Latest available build
Latest available build
Latest available build + Outlook / Word / Excel / Powerpoint
Latest build. eg. Firefox / Chrome / Edge / Safari
7Zip / WinRar / Adobe Reader
We want to reward individuals for their time in bug discovery, not just exploit writing. Truly eliminating bug classes.
Comprised of hand-selected, highly respected researchers and subject matter experts, judges have been chosen based on their past industry achievements and breakthroughs in the areas of vulnerability discovery and exploitation.
Their roles include:
Crowdfense is a world-leading vulnerability research hub, engineered from the ground up to serve institutional Customers and cyber-security Researchers alike. We strive to establish a new standard in researching, testing and trading active cyber-defense capabilities, where both Researchers and Customers can benefit from higher levels of professionalism, transparency and trust. With our dedicated technical and organizational support, researchers can achieve the best returns on their work and customers the best returns on their investment.
Leverage our global community of white hat hackers: forget penetration testing and access a virtually unlimited pool of experts to maximize your testing capabilities, choose the experts in charge of your security, submit your scopes to be tested to the hunters YOU select – or to our entire community. Make cybersecurity an accelerator of your digital transformation.
The Bugbounty.sa is a crowdsourced security platform where cybersecurity researchers and enterprises can connect to identify and tackle vulnerabilities in a cost-efficient way, while reserving the rights of both parties. The platform is managed to support collaboration between experienced cybersecurity researchers and organizations, as well as managing the transactional processes in a secured trusted environment. Together, we can defeat all possible threats.
HITB are organizers of the HITB Security Conference or HITBSecConf - a community-backed series of security conferences held annually in various locations around the world. The main aim of HITBSecConf is to enable the dissemination, discussion and sharing of deep knowledge network security information with a focus on groundbreaking attack and defense methods.
Luta Security is the first and only company to offer expertise in creating mature, robust vulnerability coordination programs, based on ISO 29147 Vulnerability disclosure, ISO 30111 Vulnerability handling processes, and the Vulnerability Coordination Maturity Model (VCMM), the latter created by Luta Security’s founder and CEO, Katie Moussouris.
VXRL (Valkyrie-X Security Research Group)(www.vxrl.hk/www.vxcon.hk) is an offensive security corporation, which organises VXCON for 9 years. VXRL provides security assessment, red team testing, training and malware analysis to corporate customers and non-profit making organizations since 2010. VXRL has helped corporations including Hong Kong Jockey Club, Hong Kong Exchange, ING Insurance (Asia), Sumitomo Mitsui Banking Corporation, NTT Security (Hong Kong), Manulife Insurance (Asia), Macau SJM Casino and Macau CEM Electricity Corporation.
The V1 platform coordinates vulnerability research and assists to start own bug bounty programs. Vulnerability Lab owns the first independent unique bug bounty platform since 2005 as infrastructure for security researchers, companies & developers. The time has come to manage your bug bounties and acknowledgements for the enterprise to become part of a new european union prevention-system.