- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 162字
- 2021-06-10 18:35:30
Nonqualifying vulnerabilities
This section lists all of the vulnerabilities that are explicitly out of scope. It lists the vulnerabilities that have been reported before or are not considered as critical enough to be reported. This is usually a long list of vulnerabilities that include commonly reported issues, such as:
- Bugs in content/services that are not owned/operated by the program
- Vulnerabilities affecting users of unsupported browsers
- Subdomain takeovers for out-of-scope domains
- Self-XSS or XSS bugs requiring an unlikely amount of user interaction
- CSRF on forms that are available to anonymous users
- Clickjacking that is, user interface hijacking on static pages
- Error messages
- HTTP 404 codes/pages or other HTTP non-200 code/pages
- Fingerprinting banner disclosure-public information disclosure
- Disclosure of known public files or directories+
- Scripting or other automation and brute forcing of intended functionalities
- Presence of application or web browser "autocomplete" or "save password" functionality
- Lack of secure and HttpOnly cookie flags
- HTTPS mixed content
- Missing HTTP security headers, specifically-Strict-Transport-Security, X-Frame-Options, X-XSS-Protection, X-Content-Type-Options, and Content-Security-Policy
推薦閱讀
- Node Security
- Extending Symfony2 Web Application Framework
- 網(wǎng)絡(luò)安全三十六計:人人該懂的防黑客技巧
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計技術(shù)揭秘
- 網(wǎng)絡(luò)安全技術(shù)與實訓(xùn)(第4版)(微課版)
- 從實踐中學(xué)習(xí)Kali Linux滲透測試
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 數(shù)據(jù)安全領(lǐng)域指南
- Web安全之深度學(xué)習(xí)實戰(zhàn)
- 數(shù)據(jù)保護:工作負(fù)載的可恢復(fù)性
- 博弈論與數(shù)據(jù)安全
- INSTANT Apple Configurator How-to
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 計算機系統(tǒng)與網(wǎng)絡(luò)安全研究
- Practical Mobile Forensics