{"id":8158,"date":"2020-10-16T00:00:00","date_gmt":"2020-10-16T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2020\/10\/16\/apple-white-hat-hack-shows-value-of-pen-testers\/"},"modified":"2023-05-12T14:34:03","modified_gmt":"2023-05-12T14:34:03","slug":"apple-white-hat-hack-shows-value-of-pen-testers","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/","title":{"rendered":"Apple White Hat Hack Shows Value of Pen Testers"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The best <a href=\"https:\/\/www.esecurityplanet.com\/threats\/employees-and-data-backup-top-cybersecurity-awareness-month-concerns\/\">Cybersecurity Awareness Month<\/a> lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of white hat hackers who found 55 vulnerabilities on Apple&#8217;s own networks, including 11 critical vulnerabilities.<\/p>\n<p>The main lesson is pretty simple: No one is safe, and the need for vigilance never ends.<\/p>\n<p>The second, and potentially more interesting lesson, is that security needs to be a combination of tools &#8211; like <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerability management<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">EDR<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">SIEM<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">firewalls<\/a> &#8211; and humans, in the form of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-certifications\/#ceh\">ethical hackers<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">pen testers<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/-security\/black-hat-the-next-generation-of-red-and-blue-security-testing-is-purple-team.html\">red teams<\/a>.<\/p>\n<p>From July 6 to October 6, the team of white hat hackers &#8211; Sam Curry, Brett Buerhaus, Ben Sadeghipour, Samuel Erb and Tanner Barnes &#8211; &#8220;hacked on the Apple bug bounty program,&#8221; as Curry, a 20-year-old web security researcher, put it in a nearly 10,000-word account of events on his <a href=\"https:\/\/samcurry.net\/hacking-apple\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>. Security pros and researchers have praised Apple for allowing unusually detailed visibility into the vulnerabilities and the hackers&#8217; methods.<\/p>\n<p>&#8220;During our engagement, we found a variety of vulnerabilities in core portions of their infrastructure that would&#8217;ve allowed an attacker to fully compromise both customer and employee applications, launch a worm capable of automatically taking over a victim&#8217;s iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources,&#8221; Curry wrote.<\/p>\n<p>The vast majority of the vulnerabilities have been fixed, some within a matter of hours after Curry&#8217;s team alerted Apple. Apple&#8217;s bug bounty program isn&#8217;t limited to products, offering rewards for any vulnerability &#8220;with significant impact to users.&#8221;<\/p>\n<p>Curry&#8217;s report is a master class in ethical hacking, detailing the methods and tools used, beginning with reconnaissance and brute force attacks that uncovered <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">VPN<\/a> server flaws and taught the team much about Apple&#8217;s applications and authentication and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">access<\/a> methods. They used the <a href=\"https:\/\/www.esecurityplanet.com\/products\/burp-scanner\/\">Burp Suite<\/a>, a well-known suite of <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\">pentesting<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">vulnerability scanning<\/a> tools, to get started and a few times along the way, in addition to a lot of trial and error, to uncover common issues like <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/prevent-xss-attacks\/\">cross-site scripting<\/a> (XSS) flaws, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/what-is-sql-injection-and-how-can-it-hurt-you\/\">SQL injection<\/a> vulnerabilities and misconfigured permissions. They spent a few hundred hours on the project, they estimate.<\/p>\n<p>Here are the 11 critical vulnerabilities; another 29 were classified as high severity.<\/p>\n<ul>\n<li>Remote Code Execution via Authorization and Authentication Bypass<\/li>\n<li>Authentication Bypass via Misconfigured Permissions allows Global Administrator Access<\/li>\n<li>Command Injection via Unsanitized Filename Argument<\/li>\n<li>Remote Code Execution via Leaked Secret and Exposed Administrator Tool<\/li>\n<li>Memory Leak leads to Employee and User Account Compromise allowing access to various internal applications<\/li>\n<li>Vertica SQL Injection via Unsanitized Input Parameter<\/li>\n<li>Wormable Stored XSS allows Attacker to Fully Compromise Victim iCloud Account<\/li>\n<li>Wormable Stored XSS allows Attacker to Fully Compromise Victim iCloud Account<\/li>\n<li>Full Response SSRF allows Attacker to Read Internal Source Code and Access Protected Resources<\/li>\n<li>Blind XSS allows Attacker to Access Internal Support Portal for Customer and Employee Issue Tracking<\/li>\n<li>Server Side PhantomJS Execution allows attacker to Access Internal Resources and Retrieve AWS IAM Keys<\/li>\n<\/ul>\n<p>So far Apple has paid the team $288,000 in bounties, and the total could eventually exceed $500,000.<\/p>\n<h2>Tools and ethical hackers both needed<\/h2>\n<p>We asked Curry and a few vulnerability management vendors if the ethical hacking team&#8217;s work could be automated, and the answer was unanimous: organizations need both tools &#8211; like vulnerability management and <a href=\"https:\/\/www.esecurityplanet.com\/products\/breach-and-attack-simulation-bas-vendors\/\">breach and attack simulation<\/a>?- and professionals to stay on top of security issues.<\/p>\n<p>&#8220;If automated tools could identify all of the vulnerabilities found by penetration testers\/ethical hackers, then there wouldn&#8217;t be any ethical hackers,&#8221; Curry told <em>eSecurity Planet<\/em>. &#8220;In a world where those scanners did exist, the tools would likely be open sourced and security vulnerabilities would be solved, making me and many others jobless.&#8221;<\/p>\n<p>Bharat Jogi, senior manager for vulnerability and threat research at Qualys, agreed. &#8220;Both vulnerability management tools and specialized security teams are essential. Vulnerability management tools quickly catch the low-hanging fruits and the known vulnerabilities and allow the security teams to focus on the site-specific, manual work.&#8221;<\/p>\n<p>&#8220;Discovering and exploiting vulnerabilities in any organization is a multi-step process, from reconnaissance to validation to successful exploitation,&#8221; Jogi told <em>eSecurity Planet<\/em>. &#8220;And to do this well, it requires a combination of tools that can perform automated vulnerability assessment at scale to identify the vulnerable pieces of software or services, followed by careful manual review and analysis of vulnerabilities to exploit them. And it was no different in this case. Vulnerability assessment and management tools play a major role in identifying the attack surface, which then can be used by specialized teams to sharpen their focus on high-value vulnerabilities and exploit them.&#8221;<\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6fbf97571d-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fbf97571d\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fbf97571d\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fbf97571d\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fbf97571d\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fbf97571d\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fbf97571d\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of white hat hackers who found 55 vulnerabilities on Apple&#8217;s own networks, including 11 critical vulnerabilities. The main lesson is pretty simple: No one is safe, and the need for [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":195,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14,15,16],"tags":[535,1478,30985,5734,10917],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[404,376],"class_list":["post-8158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","category-threats","category-trends","tag-apple","tag-bug-bounty-programs","tag-pen-testing","tag-sql-injection","tag-vulnerability-scanning","b2b_audience-awareness-and-consideration","b2b_product-hackers","b2b_product-security-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple White Hat Hack Shows Value of Pen Testers<\/title>\n<meta name=\"description\" content=\"An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple White Hat Hack Shows Value of Pen Testers\" \/>\n<meta property=\"og:description\" content=\"An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-16T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-12T14:34:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Apple White Hat Hack Shows Value of Pen Testers\",\"datePublished\":\"2020-10-16T00:00:00+00:00\",\"dateModified\":\"2023-05-12T14:34:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\"},\"wordCount\":795,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png\",\"keywords\":[\"Apple\",\"bug bounty programs\",\"pen testing\",\"SQL injection\",\"vulnerability scanning\"],\"articleSection\":[\"Networks\",\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\",\"name\":\"Apple White Hat Hack Shows Value of Pen Testers\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png\",\"datePublished\":\"2020-10-16T00:00:00+00:00\",\"dateModified\":\"2023-05-12T14:34:03+00:00\",\"description\":\"An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png\",\"width\":600,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple White Hat Hack Shows Value of Pen Testers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple White Hat Hack Shows Value of Pen Testers","description":"An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/","og_locale":"en_US","og_type":"article","og_title":"Apple White Hat Hack Shows Value of Pen Testers","og_description":"An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/","og_site_name":"eSecurity Planet","article_published_time":"2020-10-16T00:00:00+00:00","article_modified_time":"2023-05-12T14:34:03+00:00","og_image":[{"width":600,"height":401,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png","type":"image\/png"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Apple White Hat Hack Shows Value of Pen Testers","datePublished":"2020-10-16T00:00:00+00:00","dateModified":"2023-05-12T14:34:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/"},"wordCount":795,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png","keywords":["Apple","bug bounty programs","pen testing","SQL injection","vulnerability scanning"],"articleSection":["Networks","Threats","Trends"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/","url":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/","name":"Apple White Hat Hack Shows Value of Pen Testers","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png","datePublished":"2020-10-16T00:00:00+00:00","dateModified":"2023-05-12T14:34:03+00:00","description":"An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/blogimages-03.png","width":600,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Apple White Hat Hack Shows Value of Pen Testers"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/8158"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=8158"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/8158\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/195"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=8158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=8158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=8158"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=8158"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=8158"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=8158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}