Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty

Книга Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty 2019-07-30

Нет прав для скачивания
Author's: Carlos A. Lozano, Shahmeer Amir

Year: 2018
Publisher: Packt Publishing
Format: PDF
Pages: 261
ISBN 978-1-78862-689-7

Get hands-on experience on concepts of Bug Bounty Hunting

Key Features

Get well-versed with the fundamentals of Bug Bounty Hunting
Hands-on experience on using different tools for bug hunting
Learn to write a bug bounty report according to the different vulnerabilities and its analysis

Book Description

Bug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers.

This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed.

This book will get you started with bug bounty hunting and its fundamentals.

What you will learn

Learn the basics of bug bounty hunting
Hunt bugs in web applications
Hunt bugs in Android applications
Analyze the top 300 bug reports
Discover bug bounty hunting research methodologies
Explore different tools used for Bug Hunting
Who this book is for
This book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing.

This book does not require any knowledge on bug bounty hunting.

Table of Contents

Basics of Bug Bounty Hunting
How to write a Bug Bounty Report
SQL Injection Vulnerabilities
Cross Site Request Forgery
Application Logic Vulnerabilities
Cross Site Scripting Attacks
SQL Injection
Open Redirect Vulnerabilities
Sub Domain Takeover
XML External Entity Vulnerability
Template Injection
Top Bug Bounty Hunting tools
Top Learning resources