Page 14 - Hands-On Bug Hunting for Penetration Testers
P. 14

Table of Contents

                    Rate-Limiting                                                             195
                Summary                                                                       195
                Questions                                                                     195
                Further Reading                                                               196

             Chapter 13: Going Further                                                        197
                Blogs                                                                         197
                    The SANS Institute                                                        197
                    Bugcrowd                                                                  198
                    Darknet                                                                   198
                    HighOn.Coffee                                                             198
                    Zero Day Blog                                                             198
                    SANS AppSec Blog                                                          199
                Courses                                                                       199
                    Penetration Testing With Kali Linux                                       199
                    The Infosec Institute Coursework                                          199
                    Udemy Penetration Testing Classes                                         200
                    Terminology                                                               200
                    Attack Scenario                                                           200
                    Attack Surface                                                            200
                    Black Box Testing                                                         201
                    Bugs                                                                      201
                    Bug Bounty Programs                                                       201
                    CORS                                                                      201
                    Data Exfiltration                                                         202
                    Data Sanitation                                                           202
                    Data Leakage                                                              202
                    Exploit                                                                   202
                    Fingerprinting                                                            203
                    Fuzzing                                                                   203
                    Google Dorks                                                              203
                    Known Component Vulnerabilities                                           203
                    OSINT                                                                     203
                    Passive Versus Active Scanning                                            204
                    Payload                                                                   204
                    Proof-of-Concept (PoC)                                                    204
                    Rules of Engagement (RoE)                                                 204
                    Red Team                                                                  204
                    Remote Code Execution (RCE)                                               205
                    Safe Harbor                                                               205
                    Scope                                                                     205
                    Security Posture                                                          205
                    Single-Origin Policy                                                      206
                    Submission Report                                                         206
                    Vulnerability                                                             206
                    White Box Testing                                                         206

                                                    [ vii ]
   9   10   11   12   13   14   15   16   17   18   19