官术网_书友最值得收藏!

Summary

This chapter has covered the origin and benefits of bug bounty programs, the background knowledge you need coming in, an overview of some of the tools we'll use in our engagements, how to get the most out of this book (practice on allowed sites), and finally, the moral and legal peril you risk by not abiding by a target site's rules of engagement or code of conduct.

In the next chapter, we'll cover different types of bug bounty programs, the key factors differentiating them, how you can evaluate where you should participate, as well as what applications make good targets, where you should focus your research, and finally, how you can use a program's rules of engagement to minimize your legal liability as a security researcher.

主站蜘蛛池模板: 乌拉特前旗| 甘洛县| 临猗县| 陇西县| 桐庐县| 重庆市| 池州市| 阳朔县| 甘德县| 新绛县| 义乌市| 颍上县| 绥宁县| 湘潭市| 长宁县| 楚雄市| 偏关县| 金昌市| 吉木萨尔县| 平阳县| 廊坊市| 博客| 烟台市| 共和县| 兴国县| 凌源市| 合川市| 额敏县| 秦皇岛市| 凤台县| 宜黄县| 乌拉特前旗| 滨海县| 余干县| 海原县| 宁波市| 定陶县| 福贡县| 同江市| 获嘉县| 安仁县|