Page 16 - Hands-On Bug Hunting for Penetration Testers
P. 16

Preface





            This book is designed to give interested coders (part-time, professional, and otherwise) the
            skills they need to start participating in public bug bounty programs, covering both general
            pentesting subjects, such as scoping your testing sessions appropriately, and bounty-
            specific security topics, such as how to format your bug submission report to ensure the
            best chance of earning a reward.
            As the need for security audits on the public web grows, crowdsourced solutions are
            becoming more popular. This book aims to give you everything you need to participate in
            those programsbwalking you through important topics with a mix of theory and direct,
            hands-on examples.


            Who this book is for

            This book is written for developers, hobbyists, pentesters, and anyone with an interest (and
            maybe a little experience) in web application security and public bug bounty programs.


            What this book covers

            $IBQUFS  , Joining the Hunt, introduces the concept of bug bounties, their value to
            companies, and the most common types of programs. It also sets up expectations for what
            the reader should know going into the book.

            $IBQUFS  , Choosing Your Hunting Ground, explains how to evaluate individual bug bounty
            programs and whether to participate in them. It explains factors such as payouts,
            community engagement, terms of engagements, and participating in company quality.

            $IBQUFS  , Preparing for an Engagement, explains how to prepare for a pentesting
            engagement, from how to standardize the reconnaissance process, to understanding the
            applicationcs attack surface, to the importance of good note taking and, later, preparing
            submission reports.

            $IBQUFS  , Unsanitized Data ` An XSS Case Study, describes how and where to find XSS
            vulnerabilities - a variety of code injection that represents one of the most common web
            application vulnerabilities today.
   11   12   13   14   15   16   17   18   19   20   21