Page 219 - Hands-On Bug Hunting for Penetration Testers
P. 219

Going Further                                                              Chapter 13

            Passive Versus Active Scanning

            Passive scans analyze data flow within web applications. They are much less noisy, having
            little or no effect on the logs and associated metrics that provide an app's maintainers with
            information. By contrast, active scanning involves sending data into the application and
            then analyzing the response. Active scanning is often prohibited, because of the damage it
            can do to a network and the ways it can degrade application performance.



            Payload

            In general software development, a payload is essentially the message of an actionbthe
            semantic content an action contains beyond its metadata, headers, and other system
            information. In a cybersecurity context, a payload is similarly the weaponized, malicious
            code snippet value of an input that escapes sanitation measures and actually executes the
            attack.


            Proof-of-Concept (PoC)

            A PoC of a vulnerability is a code snippet or series of instructions for proving the security
            issue in question exists. A PoC should be as simple as possible to show the minimum
            conditions necessary for triggering an exploit. We discuss PoCs within the context of CSRF
            in $IBQUFS  , CSRF and Insecure Session Authentication.



            Rules of Engagement (RoE)

            The RoE for a bug bounty program (also know as its disclosure guidelines or code of
            conduct) describe the most valuable vulnerabilities the company would like to test for,
            allowed/prohibited testing methodologies and tools, research scope, and out-of-bounds
            vulnerabilities. The RoE is the most important reference document you start any pentesting
            engagement with, since it shapes the rest of your investigation.



            Red Team

            A company's red team is the internal security team responsible for mimicking the attacks
            and behavior of outside actors, probing the defenses of the company's network and
            exposing weaknesses through repeated offensive analysis and attempted intrusion.




                                                    [ 204 ]
   214   215   216   217   218   219   220   221   222   223   224