- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 126字
- 2021-07-16 17:53:16
Methodology
If you discovered the bug using a particular tool, tell them (and don't use a scanner if they explicitly said not to!). It can help the team fielding your report validate your finding if they use something similar and can incorporate that into reproducing the issue. In this case, we would just say that we submitted the snippet and verified the bug manually.
It's also useful to list some basic info about the environment in which the vulnerability was discovered: your operating system, browser type and version (plus any add-ons or extensions if they're relevant), and any miscellaneous information you think is relevant (for example, was it discovered in an incognito window? If using curl, Postman, or another tool, did you use any particular headers?).
- 數(shù)字身份與元宇宙信任治理
- 白帽子講Web安全(紀(jì)念版)
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- Learning Devise for Rails
- Building a Home Security System with BeagleBone
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Mastering Reverse Engineering
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實施指南
- 交換機(jī)·路由器·防火墻(第2版)
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用
- 計算機(jī)網(wǎng)絡(luò)安全與應(yīng)用技術(shù)(第2版)
- 2023—2024年中國網(wǎng)絡(luò)安全發(fā)展藍(lán)皮書
- 網(wǎng)絡(luò)空間安全實踐能力分級培養(yǎng)(I)
- 極限黑客攻防:CTF賽題揭秘