Page 224 - Hands-On Bug Hunting for Penetration Testers
P. 224

Assessment







            Chapter 1



                   1.  A growing number of companies are crowdsourcing their security auditsbboth
                      to cut costs internally and benefit from the greater variety of researchers,
                      strategies, and technologies.
                   2.  Participating in bug bounty programs gives you valuable, practical security
                      experience against real production targets. It also earns you money.
                   3.  You'll need some basic web tech skills, but also a general curiosity and
                      investigative desire to break things.
                   4.  Some tool, such as Burp Suite, are workhorses that integrate multiple functions
                      (proxying, scanning, mapping) for maximum effect, while some are for a more
                      specific outcome (TRQNBQ for SQLi discovery, XGV[[ for Brute Force file
                      discovery, and so on) along with the single-purpose, one-off scripts that we
                      assemble to add extra features or glue together workflows.
                   5.  Adding EPDVNFOU MPDBUJPO PSJHJO can ensure that we are targeting an in-
                      scope domain. This information also gives us a valuable insight to the developers
                      patching the bug.
                   6.   Considering the impact of a vulnerability is essential to writing a compelling
                      attack scenario. Writing code to actually harm the application, a user, or a third-
                      party service is absolutely out of bounds, even if done to prove the exploit.
                   7.  The Computer Fraud and Abuse Act governs domestic cybersecurity law as an
                      extension of the earlier computer fraud law. The bill was passed in no small part
                      to the sobering effect of the 1983 hit starring Matthew Broderick, Wargames,
                      which the House Committee report on the law described as "a realistic
                      representation of the automatic dialing and access capabilities of the personal
                      computer."
   219   220   221   222   223   224   225   226   227   228   229