- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 126字
- 2021-07-16 17:53:16
Methodology
If you discovered the bug using a particular tool, tell them (and don't use a scanner if they explicitly said not to!). It can help the team fielding your report validate your finding if they use something similar and can incorporate that into reproducing the issue. In this case, we would just say that we submitted the snippet and verified the bug manually.
It's also useful to list some basic info about the environment in which the vulnerability was discovered: your operating system, browser type and version (plus any add-ons or extensions if they're relevant), and any miscellaneous information you think is relevant (for example, was it discovered in an incognito window? If using curl, Postman, or another tool, did you use any particular headers?).
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 網(wǎng)絡(luò)安全三十六計:人人該懂的防黑客技巧
- 網(wǎng)絡(luò)空間安全實驗
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- End to End GUI Development with Qt5
- 數(shù)字銀行安全體系構(gòu)建
- 從實踐中學(xué)習(xí)Nmap滲透測試
- 黑客攻防從入門到精通:實戰(zhàn)篇(第2版)
- Web前端黑客技術(shù)揭秘
- 反黑風(fēng)暴:黑客社會工程學(xué)攻防演練
- ATT&CK框架實踐指南(第2版)
- Python Penetration Testing Essentials
- 大數(shù)據(jù)時代的智慧城市與信息安全
- 數(shù)據(jù)中心安全防護技術(shù)