- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 127字
- 2021-07-16 17:53:02
Summary
This chapter has covered the origin and benefits of bug bounty programs, the background knowledge you need coming in, an overview of some of the tools we'll use in our engagements, how to get the most out of this book (practice on allowed sites), and finally, the moral and legal peril you risk by not abiding by a target site's rules of engagement or code of conduct.
In the next chapter, we'll cover different types of bug bounty programs, the key factors differentiating them, how you can evaluate where you should participate, as well as what applications make good targets, where you should focus your research, and finally, how you can use a program's rules of engagement to minimize your legal liability as a security researcher.
推薦閱讀
- Web漏洞分析與防范實戰(zhàn):卷1
- Mobile Forensics Cookbook
- Getting Started with FortiGate
- 反黑命令與攻防從新手到高手(微課超值版)
- 數(shù)據(jù)安全實踐指南
- Kali Linux Wireless Penetration Testing Cookbook
- Testing and Securing Android Studio Applications
- 云原生安全與DevOps保障
- 學電腦安全與病毒防范
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 數(shù)據(jù)保護:工作負載的可恢復性
- VMware vCloud Security
- 黑客攻防與電腦安全從新手到高手(超值版)
- 紅藍攻防:技術與策略(原書第3版)
- 2010年中國互聯(lián)網(wǎng)網(wǎng)絡安全報告