官术网_书友最值得收藏!

Summary

This chapter has covered the origin and benefits of bug bounty programs, the background knowledge you need coming in, an overview of some of the tools we'll use in our engagements, how to get the most out of this book (practice on allowed sites), and finally, the moral and legal peril you risk by not abiding by a target site's rules of engagement or code of conduct.

In the next chapter, we'll cover different types of bug bounty programs, the key factors differentiating them, how you can evaluate where you should participate, as well as what applications make good targets, where you should focus your research, and finally, how you can use a program's rules of engagement to minimize your legal liability as a security researcher.

主站蜘蛛池模板: 阳西县| 济阳县| 呈贡县| 金平| 博罗县| 高密市| 奈曼旗| 卓资县| 陕西省| 长宁县| 公主岭市| 平安县| 宁安市| 会宁县| 曲周县| 胶南市| 古浪县| 平谷区| 合作市| 同德县| 江永县| 法库县| 桂平市| 金川县| 甘孜县| 五河县| 象州县| 西吉县| 石林| 鄯善县| 巴彦淖尔市| 常德市| 沙湾县| 富川| 若羌县| 图木舒克市| 许昌市| 德兴市| 滨海县| 历史| 海兴县|