- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 158字
- 2021-07-16 17:53:02
Choosing Your Hunting Ground
When you're deciding what bug bounty programs you'd like to participate in, it's nice to have a baseline of information about your options – an offering company's report-submission process, submission success rate, the attack surface of the sites in question, and more. Luckily, that information is typically easy to find based on the type of company, its size, the nature of its reward program (third-party marketplace, in-house), and its public statements and documentation.
This chapter will cover how to evaluate marketplaces, programs, and companies and gauge their promise as productive engagements. It will also cover how to zero-in on the areas of web applications where you're most likely to find bugs. At the end of it, you'll know what programs to participate in, why, and how you can make the most of your target application – all while ensuring you color within the lines of your agreed-upon rules of engagement.
- Node Security
- 信息系統(tǒng)安全檢測與風(fēng)險(xiǎn)評估
- INSTANT Burp Suite Starter
- 計(jì)算機(jī)病毒原理與防范(第2版)
- API安全技術(shù)與實(shí)戰(zhàn)
- 物聯(lián)網(wǎng)安全滲透測試技術(shù)
- Mastering Reverse Engineering
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實(shí)施指南
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- INSTANT Apple Configurator How-to
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 白話零信任
- 黑客攻防與電腦安全從新手到高手(超值版)
- 隱私保護(hù)機(jī)器學(xué)習(xí)
- CPK通向賽博安全之路:理論與實(shí)踐CPK Solution to Cyber Security:Theory and Practice