- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 91字
- 2021-06-10 18:35:24
Number of vulnerabilities
The first thing you can observe in a researcher's profile is how many vulnerabilities the researcher has reported in his bug bounty hunting career. This indicated how much the researcher is active on the platform and how many vulnerabilities he has reported to date. A high number of reported vulnerabilities does not usually mean that the researcher has a positive track record and is relative to different factors. That is, if the researcher has 1,000 vulnerabilities submitted over a period of 1 year, the researcher is quite active.
推薦閱讀
- RESTful Java Web Services Security
- 數(shù)字身份與元宇宙信任治理
- Kali Linux CTF Blueprints
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- 數(shù)據(jù)安全實踐指南
- 移動APT:威脅情報分析與數(shù)據(jù)防護
- Kerberos域網(wǎng)絡(luò)安全從入門到精通
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- 社會工程:防范釣魚欺詐(卷3)
- 信息組織
- CTF網(wǎng)絡(luò)安全競賽入門教程
- 黑客攻防從入門到精通:絕招版(第2版)