Jan. 8, 2024, 6:42 p.m. | Black Hat

Black Hat www.youtube.com

Question: "Prove to me that you achieved something in hunting bugs in this component."
Answer: "The vendor finally changed their bounty rule for this component after my continuous bug reports."

Unauthenticated remote code execution bugs are always the focus of both offensive and defensive vulnerability research. Because of the high impact of these critical bugs, the Windows insider preview bounty program pays $10,0000 for an unauthenticated RCE bug....

By: Yuki Chen

Full Abstract and Presentation Materials: https://www.blackhat.com/us-23/briefings/schedule/#diving-into-windows-remote-access-service-for-pre-auth-bugs-31968

access auth bounty bug bugs code code execution continuous defensive focus high hunting impact offensive prove question remote access remote code remote code execution reports research service unauthenticated vendor vulnerability vulnerability research windows

PMO Cybersécurité H/F

@ Hifield | Sèvres, France

Third Party Risk Management - Consultant

@ KPMG India | Bengaluru, Karnataka, India

Consultant Cyber Sécurité H/F - Strasbourg

@ Hifield | Strasbourg, France

Information Security Compliance Analyst

@ KPMG Australia | Melbourne, Australia

GDS Consulting - Cyber Security | Data Protection Senior Consultant

@ EY | Taguig, PH, 1634

Senior QA Engineer - Cloud Security

@ Tenable | Israel