- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 258字
- 2021-06-10 18:35:32
Writing the proof of concept of a report
Without the proof of concept replication steps, there is no way that the team can recreate the scenario that you just created, so it is important that you list down the steps exactly as you replicated the vulnerability. You should always treat the program owner as a newbie when explaining the proof of concept to them. This way, you can list down all of the steps in a hierarchical manner. Having simple, easy-to-follow, step-by-step instructions will help those triaging your issue to confirm its validity at the earliest opportunity. For instance, if I identified an XSS vulnerability, here is what the replication steps would look like:
- Go to the following [URL].
- Log in using your username and password (you need an account to do this).
- On the search box at the top-right, insert the following information:
<script>alert(document.domain);</script>
- Click the Lookup button.
- You'll see a JavaScript popup box showing your domain.
The addition of screenshots as well as videos can greatly help the program owners to understand the vulnerability. Visual aids are always appreciated by the team. If the team is busy reviewing hundreds of reports in a day, it is possible that they may not even go through your report.
To give the program owner an idea about the severity of the flaw you found, you can show them how a malicious attacker could exploit the vulnerability you identified. You can describe a possible scenario and how and what the organization (and its clients) could lose by exploiting this flaw.
- 科技安全:戰(zhàn)略實(shí)踐與展望
- Kali Linux Social Engineering
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- 隱私計(jì)算
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 先進(jìn)云安全研究與實(shí)踐
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- 網(wǎng)絡(luò)安全態(tài)勢(shì)感知
- 華為Anti-DDoS技術(shù)漫談
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- Android Application Security Essentials
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐
- 云原生安全