官术网_书友最值得收藏!

Summary

This chapter has covered the origin and benefits of bug bounty programs, the background knowledge you need coming in, an overview of some of the tools we'll use in our engagements, how to get the most out of this book (practice on allowed sites), and finally, the moral and legal peril you risk by not abiding by a target site's rules of engagement or code of conduct.

In the next chapter, we'll cover different types of bug bounty programs, the key factors differentiating them, how you can evaluate where you should participate, as well as what applications make good targets, where you should focus your research, and finally, how you can use a program's rules of engagement to minimize your legal liability as a security researcher.

主站蜘蛛池模板: 吴川市| 虹口区| 永靖县| 永宁县| 永春县| 彰化县| 肇源县| 呼玛县| 郑州市| 青阳县| 新津县| 合山市| 高青县| 靖江市| 壶关县| 芦溪县| 定远县| 托克逊县| 林周县| 桑植县| 铜山县| 青海省| 宾川县| 苏州市| 渑池县| 临夏市| 阜南县| 远安县| 游戏| 兰西县| 乌兰察布市| 峨山| 龙山县| 文水县| 将乐县| 桂平市| 澄迈县| 特克斯县| 邹平县| 都匀市| 平江县|