Pages:
Author

Topic: How to monetize an Exploit (Privilege Escalation) on Exchanges? - page 2. (Read 471 times)

legendary
Activity: 3472
Merit: 1722
See if they have any bug bounty programs, if they do read about them, if they don't have a history of mistreating those who reported bugs to them, responsibly disclose the vulnerabilities and collect the rewards which would likely be bountiful.
legendary
Activity: 2702
Merit: 4002
Most platforms discover hackers when they start withdrawing unnatural amounts of trading volumes, so as long as you keep yourself hidden for the longest period, they will not be able to exploit the vulnerability.

I will verify the safe volumes that can be withdrawn without verifying the identity and create accounts through them for as long as possible, then the discovery of hack becomes useless because the amounts have been withdrawn a long time ago and the tracking process is more difficult.


After that, will try to leave some backdoors.
hero member
Activity: 1204
Merit: 531
Metaverse 👾 Cyberweapons
Hello Fellow Members, Hi Dears!

Imagine that tonight you successfully wrote a zero-day (0day) exploit for unlimited privilege escalation and arbitrary remote code execution that surely anonymously works on several cryptocurrency exchanges.

You are able also to practically use the exploit anytime.
Now what would you do with it and how?

(Each answer contributes to non-profit academic research about hackers, Thank you.)
Pages:
Jump to: