- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 127字
- 2021-07-16 17:53:02
Summary
This chapter has covered the origin and benefits of bug bounty programs, the background knowledge you need coming in, an overview of some of the tools we'll use in our engagements, how to get the most out of this book (practice on allowed sites), and finally, the moral and legal peril you risk by not abiding by a target site's rules of engagement or code of conduct.
In the next chapter, we'll cover different types of bug bounty programs, the key factors differentiating them, how you can evaluate where you should participate, as well as what applications make good targets, where you should focus your research, and finally, how you can use a program's rules of engagement to minimize your legal liability as a security researcher.
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 腦洞大開:滲透測試另類實戰攻略
- INSTANT Metasploit Starter
- 深入淺出隱私計算:技術解析與應用實踐
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- API攻防:Web API安全指南
- 數字化轉型浪潮下的數據安全最佳實踐指南
- CTF競賽權威指南(Pwn篇)
- Digital Forensics with Kali Linux
- 計算機網絡安全基礎(第5版)
- 網絡安全設計、配置與管理大全
- 互聯網企業安全高級指南
- 信息安全工程與實踐
- Practical Internet of Things Security
- Manga Studio 5 Beginner's Guide