- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 142字
- 2021-07-16 17:53:07
Summary
This chapter discussed the criteria you can use to evaluate bug bounty marketplaces, programs, and individual pentesting targets. It covered different types of programs, their distinguishing features, and some of the basics of the bug bounties offered by Amazon, Facebook, Google, GitHub, and Microsoft, along with the learning resources and the general value of third-party bug bounty marketplaces such as Bugcrowd, HackerOne , Vulnerability Lab, BountyFactory, and Synack. It also went over the appeal of swag reward programs, the unique role of the Internet bug bounty Program, the nature of Coordinated Vulnerability Disclosure and the risks in using third-party brokers, along with how the Rules of Engagement/code of conduct for different bug bounty programs can differ. Finally, it covered setting up systems and processes within your own pentesting engagements to abide by those rules and protect yourself as much as possible.
- 特種木馬防御與檢測(cè)技術(shù)研究
- Learning Veeam? Backup & Replication for VMware vSphere
- 防火墻技術(shù)與應(yīng)用(第2版)
- Spring Security(Third Edition)
- Learning Devise for Rails
- 局域網(wǎng)交換機(jī)安全
- 物聯(lián)網(wǎng)安全滲透測(cè)試技術(shù)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 華為防火墻實(shí)戰(zhàn)指南
- 白話零信任
- 信息內(nèi)容安全管理及應(yīng)用
- Learn Azure Sentinel
- Practical Internet of Things Security
- 紅藍(lán)攻防:技術(shù)與策略(原書(shū)第3版)
- 一本書(shū)讀透金融科技安全