- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 131字
- 2021-07-16 17:53:05
Microsoft
Microsoft has a rewards program covering both its consumer-software-stable and web-app products, such as their cloud offering, Azure. The Microsoft Bounty Program site goes into detail about submission-report formatting, showing examples of both good and bad specimens, and has detailed, specific testing guidelines for every Microsoft property included. But there isn't a deep reserve of learning material from a general pentesting perspective, and less in the way of community. Microsoft, like many other companies, has its own public leaderboard and ranking system.
Their blog is a good source for more general Infosec analysis. In one series, they provide an in-depth analysis, including source code examples, of Windows exploits used by the Shadow Brokers, the infamous hacking syndicate known to have leaked NSA hacking tools in the summer of 2016.
- Extending Symfony2 Web Application Framework
- Android應用安全實戰:Frida協議分析
- 黑客大曝光:無線網絡安全(原書第3版)
- 信息系統安全檢測與風險評估
- 網絡安全意識導論
- 計算機病毒分析與防范大全(第3版)
- Mastering Kali Linux for Advanced Penetration Testing
- 反黑命令與攻防從新手到高手(微課超值版)
- 計算機病毒原理與防范(第2版)
- 模糊測試:強制發掘安全漏洞的利器
- 網絡安全與攻防入門很輕松(實戰超值版)
- Mastering Reverse Engineering
- 電腦安全與攻防入門很輕松(實戰超值版)
- 網絡用戶行為的安全可信分析與控制
- 博弈論與數據安全