- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 378字
- 2021-06-10 18:35:31
Writing the description of a report
The second part of the report is the description. A description must be precise, clear, and to the point. Program owners want to have direct engagement with any text so they do not have to read much and can pick out the salient points easily. The description should not be something generic; it should be environmental and scenario-specific. This allows report readers to relate to the reports closely rather than thinking of them as generic.
Describing a vulnerability is not an easy task for a reporter. However, a method to describe a flaw in a to-the-point and a clear way is to provide links for issues that can help program owners understand, identify, and resolve the issues in a report. The reference links can be taken from technical resources, such as stack overflow, the Open Web Application Security Project (OWASP), and so on. It is not advised to copy and paste links and descriptions from automated tools and online sites. This gives a very bad impression about the reporter and shows that they did not have time even to write their own general report.
An example of a good description would be similar to the following one:
An example of a bad description would be something like the following:
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 同態(tài)密碼學(xué)原理及算法
- 軟件開(kāi)發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- Kali Linux Wireless Penetration Testing Cookbook
- Python Penetration Testing Cookbook
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- VMware vCloud Security
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- Practical Mobile Forensics
- Practical Internet of Things Security
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- 網(wǎng)絡(luò)空間安全體系
- BeagleBone for Secret Agents
- 商用密碼應(yīng)用與安全性評(píng)估