- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 151字
- 2021-07-16 17:53:04
Company-Sponsored Initiatives
Company-sponsored programs are just what they sound like. It's not just large mega-corps that have bounty programs – a surprising number of businesses have a process for rewarding security contributions. The size of each company can drastically effect the requirements and conditions for a reward: large companies pay top dollar for vulnerabilities, but the low-hanging fruit of those flaws will already have been picked; start-ups will have less mature applications, but probably a smaller application attack surface, assembled from a newer stack with fewer known vulnerabilities, and might want to pay for contributions in swag. Companies that are mature enough to suffer from technical debt, but also have a budget to pay rewards, are a nice fit. Sometimes, though, you'll just have to poke around in different areas, taking your chances, to find your next vulnerability.
Here are some examples of the programs offered by larger companies.
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- Metasploit Penetration Testing Cookbook(Second Edition)
- Kali Linux Wireless Penetration Testing Cookbook
- ARM匯編與逆向工程:藍(lán)狐卷·基礎(chǔ)知識(shí)
- 云原生安全技術(shù)實(shí)踐指南
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- 實(shí)用黑客攻防技術(shù)
- 信息安全工程與實(shí)踐
- 黑客攻擊與防范實(shí)戰(zhàn)從入門到精通
- Web安全攻防從入門到精通
- CTF網(wǎng)絡(luò)安全競(jìng)賽入門教程
- CCNA Security 210-260 Certification Guide
- Web前端黑客技術(shù)揭秘