- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 259字
- 2021-07-16 17:53:05
Finding Other Programs
Many companies have bug bounty programs. If there's a particular site or app you're interested in testing, finding out whether it's supported by a bug bounty is as easy as a couple of searches. Queries that take advantage of Google's expressive search syntax, such as inurl:/security/, intext:bug bounty, and intext:reward are all great building blocks you can use to discover new programs. You can even combine them to drill down into bounty programs that are specific to a certain application – a query such as intext:"Bug Bounty" AND intext:"vulnerability" AND intext:"reward" AND inurl:"/wp-content/" can be used to return program pages for Wordpress sites (credit to Sachin Wagh (@tiger_tigerboy) for the dorks).
You can even set up a Google alert using these search terms and others, to give you a simple, automated way of discovering new programs to participate in.
For something a little less ad-hoc: in addition to the great teaching resources it provides, Bugcrowd curates a list populated by its members on what bug bounty programs are available as well as whether they provide financial compensation versus company swag, their age, and whether or not they feature a "Hall of Fame" for successful researchers. You can find the table at https://www.bugcrowd.com/bug-bounty-list/.
Firebounty, mentioned earlier as a product of YesWeH4ck, is a hybrid that shows that bounty programs from other platforms as well as its own unique offerings. As a product of the French security scene, it has an interesting mix of both transatlantic and European websites, mobile apps, and APIs.
- 云原生安全:攻防實踐與體系構建
- CTF實戰:技術、解題與進階
- SASE原理、架構與實踐
- 工業互聯網安全
- 網絡空間安全:管理者讀物
- 開發者的Web安全戒律:真實威脅與防御實踐
- Learning Veeam? Backup & Replication for VMware vSphere
- Kali Linux Wireless Penetration Testing Cookbook
- 數據安全與隱私計算(第3版)
- Computer Forensics with FTK
- Testing and Securing Android Studio Applications
- 硬黑客:智能硬件生死之戰
- 復雜信息系統網絡安全體系建設指南
- 信息內容安全管理及應用
- 黑客攻防從入門到精通:命令版