官术网_书友最值得收藏!

  • Bug Bounty Hunting Essentials
  • Carlos A. Lozano Shahmeer Amir
  • 258字
  • 2021-06-10 18:35:32

Writing the proof of concept of a report

Without the proof of concept replication steps, there is no way that the team can recreate the scenario that you just created, so it is important that you list down the steps exactly as you replicated the vulnerability. You should always treat the program owner as a newbie when explaining the proof of concept to them. This way, you can list down all of the steps in a hierarchical manner. Having simple, easy-to-follow, step-by-step instructions will help those triaging your issue to confirm its validity at the earliest opportunity. For instance, if I identified an XSS vulnerability, here is what the replication steps would look like:

  1. Go to the following [URL].
  2. Log in using your username and password (you need an account to do this).
  3. On the search box at the top-right, insert the following information:
<script>alert(document.domain);</script> 
  1. Click the Lookup button.
  2. You'll see a JavaScript popup box showing your domain.

The addition of screenshots as well as videos can greatly help the program owners to understand the vulnerability. Visual aids are always appreciated by the team. If the team is busy reviewing hundreds of reports in a day, it is possible that they may not even go through your report.

To give the program owner an idea about the severity of the flaw you found, you can show them how a malicious attacker could exploit the vulnerability you identified. You can describe a possible scenario and how and what the organization (and its clients) could lose by exploiting this flaw.

主站蜘蛛池模板: 大埔区| 奉节县| 巴林左旗| 屏南县| 镇雄县| 陕西省| 安塞县| 清新县| 沅江市| 柘城县| 如皋市| 苗栗县| 吉首市| 佛山市| 垦利县| 定州市| 岚皋县| 进贤县| 安康市| 耒阳市| 崇明县| 江津市| 兴山县| 玉门市| 北宁市| 惠东县| 黄平县| 大同市| 花莲县| 合肥市| 金堂县| 油尖旺区| 大同县| 霸州市| 辽阳县| 宜阳县| 株洲县| 河津市| 栾城县| 离岛区| 彩票|