- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 148字
- 2021-06-10 18:35:32
Responding to the queries of the team
At this point, you have submitted the report and the team has seen it. Now, there are two scenarios. If your report is clear and thorough, the team would readily accept it given that the vulnerability exists. However, even if the report is clear the team may still have some questions, which is natural and does not need to diminish your confidence. Here are a few tips on how to respond to the team if they have queries:
- Always be respectful
- Never ask them about the resolution or fix timeline
- Include more technical details with every comment
- Be thorough in your provision of technical details
- Have patience, as the team does have other reports
- Always ask about the bounty after the resolution
- Accept politely if the team rejects your report
- If you still think the issue is valid, you can interject
推薦閱讀
- 網(wǎng)絡(luò)安全與管理
- 可信計(jì)算3.0工程初步
- 白帽子講Web安全(紀(jì)念版)
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 同態(tài)密碼學(xué)原理及算法
- 硬黑客:智能硬件生死之戰(zhàn)
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- Digital Forensics with Kali Linux
- 物聯(lián)網(wǎng)安全滲透測(cè)試技術(shù)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 電腦安全與攻防入門(mén)很輕松(實(shí)戰(zhàn)超值版)
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專(zhuān)供版)