Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 1dc932d

Browse files
committed
hackerone vpn article
1 parent 70dee6c commit 1dc932d

File tree

1 file changed

+23
-0
lines changed

1 file changed

+23
-0
lines changed

docs/programs/hackerone-vpn.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: "HackerOne VPN"
3+
path: "/programs/hackerone-vpn.html"
4+
id: "programs/hackerone-vpn"
5+
---
6+
7+
You can require hackers to set up a virtual private network (VPN) instance with the HackerOne VPN in order to find vulnerabilities in your program. The HackerOne VPN enables you to have granular visibility into hacker activities on your program and assets.
8+
9+
To opt-in to the HackerOne VPN, contact your program manager.
10+
11+
### FAQs
12+
Question | Answer
13+
-------- | ------
14+
What is captured and logged by the HackerOne VPN? | All packets and netflow are captured. HTTPS is automatically decrypted, all other protocols (SMTPS, SSH, etc.) are captured but if encrypted, are not decrypted by HackerOne.
15+
Does the VPN log each keystroke? | No, the VPN uses split tunnel technology which doesn't log keystrokes.
16+
What additional information about hacker activity does the HackerOne VPN provide? | The VPN provides session-level detail on URLs hit by each participating hacker, including when, how often, and the duration.
17+
How can the data captured by the VPN be accessed? | Access is based on guidelines established by HackerOne.<br><br>Authorized program personnel may make specific data requests which must include the data requested and its intended use.
18+
How will access to the HackerOne VPN data be made available? | Data is made available via a password-protected Google Drive folder.
19+
Where is the data log stored? | Data is stored in dedicated AWS S3 buckets that are unique for each program or Challenge.
20+
How long is the data retained? | Data is stored for 12 months from the end of the program or Challenge.
21+
Does the HackerOne VPN allow site to site tunnels? | No, HackerOne VPN does not support dedicated connections directly to one or more assets.
22+
How do I revoke access for a specific hacker on my program? | Make the revoke request to HackerOne and we’ll disable the hacker’s unique IP address.
23+
How can we whitelist testing-related traffic on our IDS? | Each Bounty program and Challenge is assigned a dedicated range of IP addresses to add to your IDS whitelist.

0 commit comments

Comments
 (0)