But still no public acknowledgement of found vulnerabilities and no bug-bounty.
-
-
-
There was aninvite only bug bounty. Not sure if it’s still out there. Haven’t looked in a while.
- Još 1 odgovor
Novi razgovor -
-
-
(PSA: please do contact AWS security if you have any findings, or even a spidey sense tingle. https://aws.amazon.com/security/vulnerability-reporting/ …)
- Još 3 druga odgovora
Novi razgovor -
-
-
Looks like they haven't updated the site yet. Still says "Permission is required for all penetration tests."https://aws.amazon.com/security/penetration-testing/ …
-
Hi, Scott, we might have been slightly too eager to roll this out, but the page is now updated: https://amzn.to/2EmUy4t . Thanks for letting us know.
Make sure to view a non-cached version! ^MN - Još 3 druga odgovora
Novi razgovor -
-
-
Its not like filling out their Prior Authorization forms are hard. They're not denying anyone testing their own systems. Still, I will applaud for less paperwork!
-
When you have to do several per week *and* apparently whenever you wanna use your AWS-hosted Kali, it adds up.
- Još 1 odgovor
Novi razgovor -
-
-
I've launched a ton of things at AWS, but this is certainly one of the things I've been happy to help get rid of. It just wasn't core to helping customers hit their goals.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Interesting that their site doesn't match.
-
Just give it some time, the change is being rolled out today
- Još 3 druga odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.