Cargando…

The Vulnerability Researcher's Handbook A Comprehensive Guide to Discovering, Reporting, and Publishing Security Vulnerabilities /

Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your work Key Features Build successful strategies for planning and executing zero-day vulnerability research Find the best ways to discl...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Strout, Benjamin (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1369645747
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 230209s2023 enk o 000 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d ORMDA  |d OCLCQ  |d EBLCP  |d OCLCF  |d OCLCQ  |d OCLCO 
019 |a 1369643737 
020 |a 9781803243566 
020 |a 1803243562 
029 1 |a AU@  |b 000073477702 
035 |a (OCoLC)1369645747  |z (OCoLC)1369643737 
037 |a 9781803238876  |b O'Reilly Media 
050 4 |a HD30.38 
082 0 4 |a 658.4/78  |2 23/eng/20230221 
049 |a UAMI 
100 1 |a Strout, Benjamin,  |e author. 
245 1 4 |a The Vulnerability Researcher's Handbook  |h [electronic resource] :  |b A Comprehensive Guide to Discovering, Reporting, and Publishing Security Vulnerabilities /  |c Benjamin Strout. 
250 |a 1st edition. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2023. 
300 |a 1 online resource (260 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Disclaimer -- Table of Contents -- Preface -- Part 1- Vulnerability Research Fundamentals -- Chapter 1: An Introduction to Vulnerabilities -- Introducing software vulnerabilities -- The CIA Triad -- Organizing impacts -- Getting familiar with software vulnerability scanners -- Common vulnerability scanning tools -- Exploring common types of software vulnerabilities -- Web applications -- Client-server applications -- Inspecting the software vulnerability life cycle -- Inception -- Discovery 
505 8 |a Exploitation and remediation -- Deprecation -- Summary -- Further reading -- Chapter 2: Exploring Real-World Impacts of Zero-Days -- Zero-days -- what are they? -- Zero-day vulnerability -- Zero-day attack -- An analogy of zero-day terminology -- Exploring zero-day case studies -- Pulse -- CVE-2019-11510 -- Confluence -- CVE-2021-26084 -- Microsoft .NET CVE-2017-8759 -- Citrix -- CVE-2019-19781 -- Considering zero-day ethics -- Researcher responsibility -- Vendor responsibility -- Summary -- Further reading -- Chapter 3: Vulnerability Research -- Getting Started with Successful Strategies 
505 8 |a Technical requirements -- What is vulnerability research? -- Conducting research -- Selecting research targets -- Finding targets that interest you -- Likely vulnerable and downloadable software -- Exploring vulnerabilities with test cases -- Test cases -- a primer -- Building effective test suites -- Writing your own test cases -- Introducing common research tools -- Note-taking, screenshot, and screen recording tools -- Hypervisors and virtual machines -- Web application proxies -- Debuggers and decompilers -- Summary -- Further reading 
505 8 |a Part 2 -- Vulnerability Disclosure, Publishing, and Reporting -- Chapter 4: Vulnerability Disclosure -- Communicating Security Findings -- Vulnerability disclosure -- what and why -- What is vulnerability disclosure? -- Why is vulnerability disclosure important? -- Different types of disclosures -- Bug bounties and coordinated disclosure -- Initiating disclosure -- What happens after disclosure? -- Sample disclosure template -- Approaching common challenges -- Duplication of efforts -- Unresponsive vendors -- Uncooperative vendors -- Failed vendors -- Hostile vendors -- Summary -- Further reading 
505 8 |a Chapter 5: Vulnerability Publishing -Getting Your Work Published in Databases -- Demystifying vulnerability publishing -- Why publish vulnerabilities? -- What are some of the risks involved in vulnerability publishing? -- Selecting the right vulnerability publishing method -- CVE -- CVE CNA intermediates -- Ineligible application publication options -- Exploitation databases -- Practical vulnerability publishing examples -- A CNA-sponsored CVE -- A CNA-LR-sponsored CVE -- CNA intermediate sponsored CVE -- Summary -- Further reading 
505 8 |a Chapter 6: Vulnerability Mediation -- When Things Go Wrong and Who Can Help 
520 |a Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your work Key Features Build successful strategies for planning and executing zero-day vulnerability research Find the best ways to disclose vulnerabilities while avoiding vendor conflict Learn to navigate the complicated CVE publishing process to receive credit for your research Book Description Vulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with the adoption and use of technology. To begin your journey of becoming a security researcher, you need more than just the technical skills to find vulnerabilities; you'll need to learn how to adopt research strategies and navigate the complex and frustrating process of sharing your findings. This book provides an easy-to-follow approach that will help you understand the process of discovering, disclosing, and publishing your first zero-day vulnerability through a collection of examples and an in-depth review of the process. You'll begin by learning the fundamentals of vulnerabilities, exploits, and what makes something a zero-day vulnerability. Then, you'll take a deep dive into the details of planning winning research strategies, navigating the complexities of vulnerability disclosure, and publishing your research with sometimes-less-than-receptive vendors. By the end of the book, you'll be well versed in how researchers discover, disclose, and publish vulnerabilities, navigate complex vendor relationships, receive credit for their work, and ultimately protect users from exploitation. With this knowledge, you'll be prepared to conduct your own research and publish vulnerabilities. What you will learn Find out what zero-day vulnerabilities are and why it's so important to disclose and publish them Learn how vulnerabilities get discovered and published to vulnerability scanning tools Explore successful strategies for starting and executing vulnerability research Discover ways to disclose zero-day vulnerabilities responsibly Populate zero-day security findings into the CVE databases Navigate and resolve conflicts with hostile vendors Publish findings and receive professional credit for your work Who this book is for This book is for security analysts, researchers, penetration testers, software developers, IT engineers, and anyone who wants to learn how vulnerabilities are found and then disclosed to the public. You'll need intermediate knowledge of operating systems, software, and interconnected systems before you get started. No prior experience with zero-day vulnerabilities is needed, but some exposure to vulnerability scanners and penetration testing tools will help accelerate your journey to publishing your first vulnerability. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Management information systems  |x Security measures. 
650 6 |a Systèmes d'information de gestion  |x Sécurité  |x Mesures. 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
655 0 |a Electronic books. 
776 0 8 |i Print version:  |a Strout, Benjamin  |t The Vulnerability Researcher's Handbook  |d Birmingham : Packt Publishing, Limited,c2023 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803238876/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30364129 
994 |a 92  |b IZTAP