- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 126字
- 2021-07-16 17:53:16
Methodology
If you discovered the bug using a particular tool, tell them (and don't use a scanner if they explicitly said not to!). It can help the team fielding your report validate your finding if they use something similar and can incorporate that into reproducing the issue. In this case, we would just say that we submitted the snippet and verified the bug manually.
It's also useful to list some basic info about the environment in which the vulnerability was discovered: your operating system, browser type and version (plus any add-ons or extensions if they're relevant), and any miscellaneous information you think is relevant (for example, was it discovered in an incognito window? If using curl, Postman, or another tool, did you use any particular headers?).
- INSTANT Netcat Starter
- Practical Network Scanning
- Learning Veeam? Backup & Replication for VMware vSphere
- 硬黑客:智能硬件生死之戰
- Mastering Reverse Engineering
- 黑客攻防從入門到精通
- ATT&CK與威脅獵殺實戰
- 動態賦能網絡空間防御
- Instant OSSEC Host-based Intrusion Detection System
- 計算機病毒揭秘與對抗
- 網站入侵與腳本技術快速防殺
- 黑客與安全技術指南
- Hands-On Spring Security 5 for Reactive Applications
- 基于數據科學的惡意軟件分析
- 網絡空間安全技術