Page 30 - Hands-On Bug Hunting for Penetration Testers
P. 30

Joining the Hunt                                                            Chapter 1

            Questions


                   1.  Why do sites offer bug bounty programs?
                   2.  What's the value in participating in them?
                   3.  What do we need to know to get the most out of this book?
                   4.  What are some of the tools we'll be using? What are they for?
                   5.  How can we make XSS BMFSU   calls more effective?
                   6.  Is it OK to think about how a vulnerability could be exploited? How about
                      writing code to test that theory?
                   7.  What's the law governing much of the criminal theory surrounding penetration
                      testing?



            Further Reading


            You can find out more about some of the topics we have discussed in this chapter at:

                      About Open Web Application Security Project (OWASP): IUUQT   XXX PXBTQ
                      PSH JOEFY QIQ "CPVU@5IF@0QFO@8FC@"QQMJDBUJPO@4FDVSJUZ@1SPKFDU
                      The 2015 UN Millennium Goals Report: IUUQ   XXX VO PSH NJMMFOOJVNHPBMT
                          @.%(@3FQPSU QEG .%(          SFW      +VMZ        QEG































                                                    [ 15 ]
   25   26   27   28   29   30   31   32   33   34   35