- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 81字
- 2021-06-10 18:35:30
Clarity
The report should be clear and should not misguide the reader into thinking that the researcher is being pushy. The following is an example of a report that sounds unclear:
"I would like to report a very critical using which you can takeover user accounts and should be fixed ASAP."
However, a clear description may contain the following sentence:
"This report contains technical details about a vulnerability in the password reset function which can allow users to take over accounts."
推薦閱讀
- DevSecOps敏捷安全
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- API攻防:Web API安全指南
- Computer Forensics with FTK
- 計算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- Learning Pentesting for Android Devices
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系
- 黑客攻防與電腦安全從新手到高手(超值版)
- 2010年中國互聯(lián)網(wǎng)網(wǎng)絡(luò)安全報告
- 網(wǎng)絡(luò)安全攻防技術(shù)實戰(zhàn)
- 應(yīng)用密碼學(xué):原理、分析與Python實現(xiàn)
- 深入淺出密碼學(xué)