- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 81字
- 2021-06-10 18:35:30
Clarity
The report should be clear and should not misguide the reader into thinking that the researcher is being pushy. The following is an example of a report that sounds unclear:
"I would like to report a very critical using which you can takeover user accounts and should be fixed ASAP."
However, a clear description may contain the following sentence:
"This report contains technical details about a vulnerability in the password reset function which can allow users to take over accounts."
推薦閱讀
- 數(shù)字安全藍(lán)皮書:本質(zhì)屬性與重要特征
- Enterprise Cloud Security and Governance
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 安全技術(shù)運(yùn)營:方法與實(shí)踐
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- Kali Linux Network Scanning Cookbook(Second Edition)
- Python Penetration Testing Cookbook
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實(shí)施指南
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測與防御
- 網(wǎng)絡(luò)空間安全導(dǎo)論