- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 97字
- 2021-06-10 18:35:28
Referring to the policy of the program
Reading the scope of the bug bounty is probably the most important thing you should do before even looking at the program's website. It will be really frustrating when you spend a week looking for vulnerabilities in a bug bounty program only to find out that the domain that you tested is not included in the scope. The conventional scope of a bug bounty program contains the following bits of information:
- Mission statement
- Participating services
- Excluded domains
- Rewards and qualifications
- Eligibility for participation
- Conduct guidelines
- Nonqualifying vulnerabilities
- Commitment to researchers
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 網絡空間攻防技術原理
- 可信計算3.0工程初步
- 暗戰亮劍:黑客滲透與防御全程實錄
- Learning Devise for Rails
- 局域網交換機安全
- 白話零信任
- Mastering Metasploit
- 企業數據安全防護指南
- Learn Azure Sentinel
- 黑客攻防從入門到精通:實戰篇(第2版)
- Hands-On Bug Hunting for Penetration Testers
- CCNA Security 210-260 Certification Guide
- Hack-A-Sat太空信息安全挑戰賽深度題解