Page 8 - Hands-On Bug Hunting for Penetration Testers
P. 8

Table of Contents






             Preface                                                                            1
             Chapter 1: Joining the Hunt                                                        6
                Technical Requirements                                                          6
                The Benefits of Bug Bounty Programs                                             7
                What You Should Already Know – Pentesting Background                           10
                Setting Up Your Environment – Tools To Know                                    10
                What You Will Learn – Next Steps                                               12
                How (Not) To Use This Book – A Warning                                         12
                Summary                                                                        14
                Questions                                                                      15
                Further Reading                                                                15
             Chapter 2: Choosing Your Hunting Ground                                           16
                Technical Requirements                                                         16
                An Overview of Bug Bounty Communities – Where to Start Your
                Search                                                                         16
                    Third-Party Marketplaces                                                   17
                       Bugcrowd                                                                17
                       HackerOne                                                               18
                       Vulnerability Lab                                                       19
                       BountyFactory                                                           19
                       Synack                                                                  19
                    Company-Sponsored Initiatives                                              20
                       Google                                                                  21
                       Facebook                                                                21
                       Amazon                                                                  22
                       GitHub                                                                  22
                       Microsoft                                                               22
                    Finding Other Programs                                                     23
                    Money Versus Swag Rewards                                                  23
                    The Internet Bug Bounty Program                                            24
                    ZeroDisclo and Coordinated Vulnerability Disclosures                       24
                The Vulnerability of Web Applications – What You Should Target                 26
                Evaluating Rules of Engagement – How to Protect Yourself                       27
                Summary                                                                        29
                Questions                                                                      29
                Further Reading                                                                30
             Chapter 3: Preparing for an Engagement                                            31
                Technical Requirements                                                         32
   3   4   5   6   7   8   9   10   11   12   13