Page 215 - Hands-On Bug Hunting for Penetration Testers
P. 215

Going Further                                                              Chapter 13

            Udemy Penetration Testing Classes

            Udemy (IUUQT   XXX VEFNZ DPN UPQJD QFOFUSBUJPO UFTUJOH ) is by far the most
            affordable option we've covered for the individual, independent researcher. With specific
            courses flavored by the focus on your programming language (Create Your Own Hacking
            Tools in Python) or tool (Learning Hacking Using Android From Scratch), there are different
            options for whatever direction you're looking at to deepen your skills.


            Terminology

            There's no shortage of jargon in security. Independent researchers, black hats, corporate red
            teams, and military agencies all have their own cultures, slang, and preferred technical
            nomenclature. We'll try and define as many essential terms as possible, so that this can be a
            clear reference whenever you come across a term or usage you don't recognize. Keep in
            mind that this dictionary is only for security-related terminology, and not general web or
            software development jargon, except where it has direct bearing on a security issue.



            Attack Scenario

            An attack scenario is a detailed, technically-valid hypothetical scenario concerning the
            damage a vulnerability could do if left unpatched and exploited in the service of a
            malicious agent. Writing compelling attack scenarios is a critical part of ensuring you get
            rewarded for a vulnerability.


            Attack Surface

            An application's attack surface is the sum of all of the points in which data is either inserted
            into or taken out of the application. Each part of the attack surface is an opportunity for a
            hacker to compromise a part of your application. The larger your app's attack surface, the
            more work you have to do to secure your app, and the more difficult it will be. Keeping
            your attack surface no larger than it absolutely needs to be is a great way to strengthen
            your security posture.












                                                    [ 200 ]
   210   211   212   213   214   215   216   217   218   219   220