- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 97字
- 2021-06-10 18:35:28
Referring to the policy of the program
Reading the scope of the bug bounty is probably the most important thing you should do before even looking at the program's website. It will be really frustrating when you spend a week looking for vulnerabilities in a bug bounty program only to find out that the domain that you tested is not included in the scope. The conventional scope of a bug bounty program contains the following bits of information:
- Mission statement
- Participating services
- Excluded domains
- Rewards and qualifications
- Eligibility for participation
- Conduct guidelines
- Nonqualifying vulnerabilities
- Commitment to researchers
推薦閱讀
- 科技安全:戰(zhàn)略實(shí)踐與展望
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- Wireshark 2 Quick Start Guide
- 黑客攻防技巧
- 深入淺出隱私計算:技術(shù)解析與應(yīng)用實(shí)踐
- Applied Network Security
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- Instant Java Password and Authentication Security
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Kali Linux高級滲透測試(原書第4版)
- Mastering Malware Analysis
- 網(wǎng)絡(luò)空間安全實(shí)戰(zhàn)基礎(chǔ)
- Web代碼安全漏洞深度剖析
- 計算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究