Page 158 - Hands-On Bug Hunting for Penetration Testers
P. 158

Access Control and Security Through Obscurity                               Chapter 8

            Questions


                   1.  Is security by obscurity a valid security layer?
                   2.  What are some common pieces of information reported for bounties?
                   3.  What's a good tool for uncovering hidden content?
                   4.  What's the difference between an API key and an access token?
                   5.  What information typically does not merit a payout as a data leak vulnerability?
                   6.  What's a downside to relying on client-side data filtering?
                   7.  What are some common vectors through which web application data leaks?



            Further Reading


            You can find out more about some of the topics we have discussed in this chapter at:
                      Google Cloud Endpoints on API Keys versus Authentication Tokens: IUUQT
                      DMPVE HPPHMF DPN FOEQPJOUT EPDT PQFOBQJ XIFO XIZ BQJ LFZ
                      Consul Config Management: IUUQT   XXX DPOTVM JP



































                                                    [ 143 ]
   153   154   155   156   157   158   159   160   161   162   163