Security Excellence for Responsible Businesses
The Tokenized Crowdsourced
Vulnerability Rewarding Platform
The Tokenized Crowdsourced
Vulnerability Rewarding Platform
The proven approach to security: don't deal with hacking attacks, but prevent it. There isn't an IT product in existence that doesn't have a bug, but how can we minimize the risks?
In 2017, invested up to $1 million of dollars, Apple has detected and fixed vulnerabilities that could potentially cause a loss of several billion dollars and significant reputational damage. Thinking ahead ensures a good ROI. Doesn’t it?
We enable business to cooperate with a community of bug hunters from different parts of the Earth. The bug bounty guarantees that various approaches are applied to identify all possible vulnerabilities and prevent the threat ahead of time.
“That’s why Intel launched a $250,000 Bug Bounty Program to find vulnerabilities and wash away the image of a disastrous patching process” (c).
The core of the HackenProof platform is the ethical cooperation between cybersecurity professionals and IT companies that care about security. We ensure responsible and coordinated vulnerability disclosure in order to encourage white hat hackers to protect modern business.
Tokenized platform means it’s decentralized among the community. Having remuneration in HKNs, bug hunters are the main stakeholders of the platform.
HKN's price directly depends on the quality of the provided services, number of secured clients and overall size of the white hat community.
Members of the Hacken Community are actively bringing the best hackers and challenging new clients to the platform.
Any bug hunter can join a program, report a bug and get a worthy reward
With HackenProof, you will get a real-time notification, and information about a bug.
How do you know that you are not at sight?
Interkassa it`s a payment processing system that operates with finances and requires a careful and rigorous approach to security.
Before the cooperation with HackenProof, Interkassa had an experience in organizing a CTF game with elements of bug hunting that was devoted to hacker`s conference.
There were some doubts regarding the launch of security improvement process with a crowdsourced approach. The aforesaid hesitations were vanished after choosing right researchers to participate in the program and making a pre-launch of vulnerability rewarding program in a private mode.
public bug bounty
Tickets is the largest booking service in Ukraine for various entities such as: planes, trains, automobiles, hotels, etc. that requires tickets.
There were 3 days of an offline hacking event in Ukraine that gathered cybersecurity experts from around the globe. Tickets.ua was totally satisfied with such a format as a private onsite bounty program.
Critical bugs were found that could allow one to travel around the world almost for free. The bugs were successfully fixed.
onsite bug bounty
OSA is an innovative project with AI and Big Data for automatic recognition, sorting and inventory of the products at the shops.
Data breaches can cause massive damage to any company. This is especially true for companies operating with big data and holding a lot of sensitive information about vendors and companies.
With OSA we conducted a private bug bounty.
private bug bounty
NapoleonX is the first crypto asset manager project piloting trading bots.
The vulnerability rewarding program was a magic wand that helped mitigate annoying blackmailers that actively threatened and extorted redemption in exchange for disclosing of a vulnerability that they found.
After some rapid crowd testing, we figured that the project has solid security and the blackmailers had no choice but to retreat or move on to another target.
Jack is 18 years old geek, and he is already one of the most prominent international ethical hackers, including his recent victory in the Hack the Air Force Program running by the US government. Currently he’s graduating from high school in one of Chicago’s suburbs. Jack shares his ideas about the future of hacking, being impressed with all the ancient Ukrainian architectures.
Geekboy grew up in Sultanpur, Uttar Pradesh, India. Sandeep’s experience with hacking started with video games when he was only a kid. Now Geekboy has been bug bounty hunting over the last three years and is already in the top-5 on HackerOne. In his interview, Sandeep gives an elaborate opinion on Hacken’s burning principle and discusses the features of modern cryptocurrencies.
Tanner works as a Security Engineer in San Francisco. Having been fascinated with computers since he was a kid, Tanner got into cybersecurity when he hacked a multiplayer computer game as a teenager. His favorite question is well known, ‘What if?..’ Tanner describes the personality traits of a perfect ethical hacker and gives his opinion on why Hacken has the best chance for becoming the international standard.
Julian grew up in Lörrach, Baden-Württemberg, Germany. Currently, he’s studying for a Mobile Systems Master’s degree at Furtwangen University. Like many young hackers, Julian started out with hacking his favorite games and then discovered how he could boost his budget by participating in all the numerous bug bounty programs. Having some prior experience with Ethereum, Julian likes the idea of a dedicated cryptocurrency for white hat hackers.
Parth is 19, and grew up in the legendary Hisar; a city in the state Haryana, India. Parth became interested in hacking at the bright young age of 14 and wanted to stand up and defend himself after being attacked online. In his interview, Parth expresses his fascination with the history of Ukraine, and offers his advice to aspiring ethical hackers and calls Hacken ‘a good investment’.
He moved to Karachi with his family at the age of 13. He graduated with a degree in Electronic Engineering from Usman Institute of Technology. Currently, Shahmeer is the CEO of Veiliux, a cybersecurity consulting firm based in Dubai. In this brief interview, Shahmeer tells the stories from his youth, shares his impressions about the professional journey of the hacker and lays out his vision for Hacken.