Page 231 - Hands-On Bug Hunting for Penetration Testers
P. 231

Assessment

                   6.  Physical testing involves breaking into a company's actual office or building to
                      gain access to a network through an on-site device. For public bug bounty
                      programs, it is completely out of scope.
                   7.  If a CSRF bug is associated with an anonymous form or other un-privileged
                      input, there's not enough of an attack scenario to warrant a payout.
                   8.  Dark patterns are UX designs that are intended to trick or defraud users.
                   9.  Most services can be brute-forced, given the time and resource. Pointing this out
                      does not constitute useful, actionable security advice.


            Chapter 13


                   1.  The SANS Institute and Bugcrowd blogs, along with Darknet, HighOn.Coffee,
                      and others, all represent good sources for up-to-date technical tutorials and
                      security news.
                   2.  Public bug bounties, which do not grant researchers privileged access to source
                      code, are strictly Black Box affairs.
                   3.  RCE allows for a staggering array of exploits. With the full powers of a Turing
                      Complete scripting language, there's no limiting the damage.
                   4.  "Safe Harbor" here is used to describe the policy that companies won't prosecute
                      researchers who abide by certain terms.
                   5.  Cross-Origin Resource Sharing is a system that governs the security process for
                      resource requests coming from different origins (hostnames, ports, and so on).
                   6.  An organization's security posture is simply its ability to deter, detect, and
                      respond to digital threats.
                   7.  Fingerprinting an application provides you with server software and version
                      information, application language, database information, and other useful data
                      points to shape your pentesting engagement.
                   8.  OSCP stands for Offensive Security Certified Professional and is a professional
                      certification offered by Offensive Security.
















                                                    [ 216 ]
   226   227   228   229   230   231   232   233   234   235   236