Microsoft announces Bounty Programs – Report vulnerabilities & get paid upto $100000

If you are one of those who likes to break into software or OS protection, then this post is for you. Microsoft is paying you to hack into Windows 8.1! Microsoft has asked hackers, security researchers and others to report vulnerabilities in their various products, including Windows 8.1, for making their products better and protecting customers. For this, Microsoft has announced various Microsoft Security Bounty Programs.

Microsoft has announced various programs which will launch on June 26, 2013:

Mitigation Bypass Bounty- The Mitigation Bypass Bounty Program asks participants to submit truly novel mitigation bypass techniques that target Windows 8.1 Preview. Qualified mitigation bypass submissions are eligible for payment of $100,000 USD, based on the quality and complexity of the bypass technique and optional defense idea. A mitigation bypass technique is designed to circumvent protections that are built into the operating systems. The program starts on 26th June,  the launch date of Windows 8.1 Preview. The Mitigation Bypass Bounty program will run indefinitely, at Microsoft’s discretion.

Internet Explorer 11 Preview Bug Bounty – Microsoft will pay up to $11,000 USD for critical-class vulnerabilities that affect Internet Explorer 11 Preview running on Windows 8.1 Preview. The bounty period for Internet Explorer 11 Preview starts on June 26, 2013, and ends July 26, 2013. Even former Microsoft employees and even previously members of IE team can participate in this.

BlueHat Bonus for Defense – The BlueHat Bonus for Defense allows Mitigation Bypass program participants to also submit a technical white paper to describe a defensive idea that could effectively block the exploitation technique they have submitted. Qualifying defense submissions will receive an additional bonus of up to $50,000 USD, depending on the quality and uniqueness of the defense idea.

The highest rewards will go to submissions that include a fully functioning exploit which concretely demonstrates that remote code execution is possible.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s