- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 127字
- 2021-07-16 17:53:02
Summary
This chapter has covered the origin and benefits of bug bounty programs, the background knowledge you need coming in, an overview of some of the tools we'll use in our engagements, how to get the most out of this book (practice on allowed sites), and finally, the moral and legal peril you risk by not abiding by a target site's rules of engagement or code of conduct.
In the next chapter, we'll cover different types of bug bounty programs, the key factors differentiating them, how you can evaluate where you should participate, as well as what applications make good targets, where you should focus your research, and finally, how you can use a program's rules of engagement to minimize your legal liability as a security researcher.
推薦閱讀
- SASE原理、架構與實踐
- 計算機病毒分析與防范大全(第3版)
- 深入淺出隱私計算:技術解析與應用實踐
- 安全技術運營:方法與實踐
- 黑客攻防與無線安全從新手到高手(超值版)
- ARM匯編與逆向工程:藍狐卷·基礎知識
- Web安全之深度學習實戰(zhàn)
- 編譯與反編譯技術實戰(zhàn)
- SQL Injection Strategies
- 網(wǎng)絡關鍵設備安全檢測實施指南
- Learning Pentesting for Android Devices
- 構建新型網(wǎng)絡形態(tài)下的網(wǎng)絡空間安全體系
- 信息系統(tǒng)安全等級化保護原理與實踐
- 社會工程:防范釣魚欺詐(卷3)
- 動態(tài)賦能網(wǎng)絡空間防御