Page 30 - Hands-On Bug Hunting for Penetration Testers
P. 30
Joining the Hunt Chapter 1
Questions
1. Why do sites offer bug bounty programs?
2. What's the value in participating in them?
3. What do we need to know to get the most out of this book?
4. What are some of the tools we'll be using? What are they for?
5. How can we make XSS BMFSU calls more effective?
6. Is it OK to think about how a vulnerability could be exploited? How about
writing code to test that theory?
7. What's the law governing much of the criminal theory surrounding penetration
testing?
Further Reading
You can find out more about some of the topics we have discussed in this chapter at:
About Open Web Application Security Project (OWASP): IUUQT XXX PXBTQ
PSH JOEFY QIQ "CPVU@5IF@0QFO@8FC@"QQMJDBUJPO@4FDVSJUZ@1SPKFDU
The 2015 UN Millennium Goals Report: IUUQ XXX VO PSH NJMMFOOJVNHPBMT
@.%(@3FQPSU QEG .%( SFW +VMZ QEG
[ 15 ]