- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 378字
- 2021-06-10 18:35:31
Writing the description of a report
The second part of the report is the description. A description must be precise, clear, and to the point. Program owners want to have direct engagement with any text so they do not have to read much and can pick out the salient points easily. The description should not be something generic; it should be environmental and scenario-specific. This allows report readers to relate to the reports closely rather than thinking of them as generic.
Describing a vulnerability is not an easy task for a reporter. However, a method to describe a flaw in a to-the-point and a clear way is to provide links for issues that can help program owners understand, identify, and resolve the issues in a report. The reference links can be taken from technical resources, such as stack overflow, the Open Web Application Security Project (OWASP), and so on. It is not advised to copy and paste links and descriptions from automated tools and online sites. This gives a very bad impression about the reporter and shows that they did not have time even to write their own general report.
An example of a good description would be similar to the following one:
An example of a bad description would be something like the following:
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- CSO進階之路:從安全工程師到首席安全官
- 白帽子講Web安全(紀念版)
- API攻防:Web API安全指南
- Digital Forensics with Kali Linux
- Falco云原生安全:Falco原理、實踐與擴展
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- INSTANT Kali Linux
- 信息系統安全等級化保護原理與實踐
- 網絡入侵檢測系統原理與應用
- 紅藍攻防:技術與策略(原書第3版)
- BeagleBone for Secret Agents
- 計算機網絡安全與應用技術(第2版)
- Learning Metasploit Exploitation and Development
- 數據中心安全防護技術