Page 17 - Hands-On Bug Hunting for Penetration Testers
P. 17

Preface

            $IBQUFS  , SQL, Code Injection and Scanners, describes the different varieties of code
            injection attacks and how to safely test for them, covering different types of injection, such
            as blind or error-based injection.

            $IBQUFS  , CSRF and Insecure Session Authentication, discusses vulnerabilities related to
            insecure session authentication, focusing on CSRF and how to create a CSRF PoC to test for
            them.

            $IBQUFS  , Detecting XML External Entities (XEE), focuses on XML External Entity
            vulnerability detection and related XML injection techniques that can work in conjunction
            with XXE.

            $IBQUFS  , Access Control and Security Through Obscurity, goes over how to find hidden
            information/data leaks in web applications and discerning between what data is important
            (and will win you an award) and whatcs not. It covers different types of sensitive data and
            gives you examples from the field.
            $IBQUFS  , Framework and Application-Specific Vulnerabilities, covers approaching a
            pentesting engagement from the perspective of testing for application/framework-specific
            vulnerabilities, focusing on general Known Common Vulnerabilities and Exposures
            (CVEs), as well as methods for testing WordPress, Rails, and Django apps, including
            strategies, tools, tips, and tricks.

            $IBQUFS   , Formatting Your Report, goes over how to compose a bug report to receive the
            maximum payout, drawing on examples and information from earlier vulnerability-specific
            chapters and providing examples (with commentary) on the finer considerations of your
            submission.

            $IBQUFS   , Other Tools, goes over other tools not covered in the course of the vulnerability
            examples and how to vet new ones. It also explains how to evaluate free versus paid
            products and jumping off points for pentesting regimens that focus on bugs not detailed
            extensively in the work (for example, weak WAF rules/network gaps).
            $IBQUFS   , Other (Out-of-Scope) Vulnerabilities, goes over other vulnerabilities not covered
            in the course of the book and why they donct command payouts in most bug bounty
            programs.
            $IBQUFS   , Going Further, explains where the reader can turn to for more information
            about participating in bug bounty programs - running through courses and resources for
            continuing to develop your security acumen. It also features a dictionary of
            pentesting/security terms to clearly define the way the book employs certain terminology.





                                                     [ 2 ]
   12   13   14   15   16   17   18   19   20   21   22