- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 162字
- 2021-06-10 18:35:30
Nonqualifying vulnerabilities
This section lists all of the vulnerabilities that are explicitly out of scope. It lists the vulnerabilities that have been reported before or are not considered as critical enough to be reported. This is usually a long list of vulnerabilities that include commonly reported issues, such as:
- Bugs in content/services that are not owned/operated by the program
- Vulnerabilities affecting users of unsupported browsers
- Subdomain takeovers for out-of-scope domains
- Self-XSS or XSS bugs requiring an unlikely amount of user interaction
- CSRF on forms that are available to anonymous users
- Clickjacking that is, user interface hijacking on static pages
- Error messages
- HTTP 404 codes/pages or other HTTP non-200 code/pages
- Fingerprinting banner disclosure-public information disclosure
- Disclosure of known public files or directories+
- Scripting or other automation and brute forcing of intended functionalities
- Presence of application or web browser "autocomplete" or "save password" functionality
- Lack of secure and HttpOnly cookie flags
- HTTPS mixed content
- Missing HTTP security headers, specifically-Strict-Transport-Security, X-Frame-Options, X-XSS-Protection, X-Content-Type-Options, and Content-Security-Policy
推薦閱讀
- 網絡安全應急管理與技術實踐
- 網絡空間安全:管理者讀物
- INSTANT Burp Suite Starter
- 黑客攻防入門秘笈
- Preventing Digital Extortion
- 諸神之眼:Nmap網絡安全審計技術揭秘
- 移動APT:威脅情報分析與數據防護
- ARM匯編與逆向工程:藍狐卷·基礎知識
- Learning Devise for Rails
- Building a Home Security System with BeagleBone
- 黑客攻防從入門到精通
- Cybersecurity Threats,Malware Trends,and Strategies
- Mastering Metasploit
- 計算機網絡安全實驗指導
- 黑客攻防入門