- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 148字
- 2021-06-10 18:35:32
Responding to the queries of the team
At this point, you have submitted the report and the team has seen it. Now, there are two scenarios. If your report is clear and thorough, the team would readily accept it given that the vulnerability exists. However, even if the report is clear the team may still have some questions, which is natural and does not need to diminish your confidence. Here are a few tips on how to respond to the team if they have queries:
- Always be respectful
- Never ask them about the resolution or fix timeline
- Include more technical details with every comment
- Be thorough in your provision of technical details
- Have patience, as the team does have other reports
- Always ask about the bounty after the resolution
- Accept politely if the team rejects your report
- If you still think the issue is valid, you can interject
推薦閱讀
- 計算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- Kali Linux Social Engineering
- 工業(yè)互聯(lián)網(wǎng)安全
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 等級保護(hù)測評理論及應(yīng)用
- INSTANT Windows PowerShell
- 工業(yè)物聯(lián)網(wǎng)安全
- 防火墻技術(shù)與應(yīng)用(第2版)
- 解密彩虹團(tuán)隊非凡實(shí)戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊)
- Instant Java Password and Authentication Security
- 學(xué)電腦安全與病毒防范
- 先進(jìn)云安全研究與實(shí)踐
- Mastering Linux Security and Hardening
- 白話零信任