- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 76字
- 2021-07-16 17:53:16
Timestamps
If you're using an automated or just code-based solution to touch the target, taking timestamps is a must – the more accurate the better. If, like us just now, you manually entered a malicious snippet, simply the time after the discovery will suffice. Giving the time of discovery in UTC will save the developer who is fielding the report from doing a mental timezone conversion before analyzing logs, usages charts, and other monitoring tools.
推薦閱讀
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 信息安全導(dǎo)論(在線實(shí)驗(yàn)+在線自測(cè))
- Learning Python for Forensics
- Getting Started with FortiGate
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- 同態(tài)密碼學(xué)原理及算法
- 數(shù)據(jù)安全實(shí)踐指南
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- CTF特訓(xùn)營(yíng):技術(shù)詳解、解題方法與競(jìng)賽技巧
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- Cybersecurity Threats,Malware Trends,and Strategies
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- Web代碼安全漏洞深度剖析
- 黑客攻防入門