Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
Carlos A. Lozano, Shahmeer Amir
- 出版商: Packt Publishing
- 出版日期: 2018-11-30
- 售價: $1,810
- 貴賓價: 9.5 折 $1,720
- 語言: 英文
- 頁數: 270
- 裝訂: Paperback
- ISBN: 1788626893
- ISBN-13: 9781788626897
-
相關分類:
駭客 Hack
海外代購書籍(需單獨結帳)
相關主題
商品描述
Get hands-on experience on concepts of Bug Bounty Hunting
Key Features
- Get well-versed with the fundamentals of Bug Bounty Hunting
- Hands-on experience on using different tools for bug hunting
- Learn to write a bug bounty report according to the different vulnerabilities and its analysis
Book Description
Bug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers.
This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed.
This book will get you started with bug bounty hunting and its fundamentals.
What you will learn
- Learn the basics of bug bounty hunting
- Hunt bugs in web applications
- Hunt bugs in Android applications
- Analyze the top 300 bug reports
- Discover bug bounty hunting research methodologies
- Explore different tools used for Bug Hunting
Who this book is for
This book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing.
This book does not require any knowledge on bug bounty hunting.
Table of Contents
- Basics of Bug Bounty Hunting
- How to write a Bug Bounty Report
- SQL Injection Vulnerabilities
- Cross Site Request Forgery
- Application Logic Vulnerabilities
- Cross Site Scripting Attacks
- SQL Injection
- Open Redirect Vulnerabilities
- Sub Domain Takeover
- XML External Entity Vulnerability
- Template Injection
- Top Bug Bounty Hunting tools
- Top Learning resources