Cargando…

The complete guide to bug bounty hunting.

Learn the essential tools and techniques for hunting and exploiting vulnerabilities in web and Android applications. Equip yourself with the knowledge and skills to find and responsibly disclose vulnerabilities to companies, gaining rewards through existing bug bounty programs. Master the best pract...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Manning Publications, [2023]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1379802112
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 230523s2023 xx 416 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF 
019 |a 1390763251 
024 8 |a 10000DIVC202334 
029 1 |a AU@  |b 000074864189 
035 |a (OCoLC)1379802112  |z (OCoLC)1390763251 
037 |a 10000DIVC202334  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230523 
049 |a UAMI 
245 0 4 |a The complete guide to bug bounty hunting. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Manning Publications,  |c [2023] 
300 |a 1 online resource (1 video file (6 hr., 56 min.)) :  |b sound, color. 
306 |a 065600 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Scott Cosentino, presenter. 
520 |a Learn the essential tools and techniques for hunting and exploiting vulnerabilities in web and Android applications. Equip yourself with the knowledge and skills to find and responsibly disclose vulnerabilities to companies, gaining rewards through existing bug bounty programs. Master the best practices of ethical hacking to detect bugs and improve security. This comprehensive, seven-hour course covers three key areas: Fundamentals of OWASP Top 10 Vulnerabilities We start the course with a look at the most common vulnerabilities currently present in web applications. The OWASP Top Ten, from the Open Web Application Security Project, helps bug bounty hunters to know what to look for in penetration tests. We break down these vulnerabilities and demonstrate what to look for in order to detect them. Kali Linux and Web Application Hacking Web applications are currently some of the most common targets for bug bounties, so we'll see how to create meaningful attacks against them. We'll use Kali Linux tools, which are popular with both attackers and the defenders trying to secure web apps against those attacks. We'll work with Nmap, SQLmap, Commix, Wfuzz, Metasploit, and many other tools to gather information about targets and launch attacks to expose their vulnerabilities. Foundations of Hacking and Penetration Testing Android Apps Most companies now have apps that are included in bug bounty programs. Learning how to scan and exploit these apps can often be a lucrative way to gain bounties. Given the new focus on application development, apps make a great target for bug bounties. 
588 |a Online resource; title from title details screen (O'Reilly, viewed May 23, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Software failures. 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
650 7 |a Software failures.  |2 fast  |0 (OCoLC)fst01124200 
655 7 |a Instructional films.  |2 fast  |0 (OCoLC)fst01726236 
655 7 |a Internet videos.  |2 fast  |0 (OCoLC)fst01750214 
655 7 |a Nonfiction films.  |2 fast  |0 (OCoLC)fst01710269 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Cosentino, Scott,  |e presenter. 
710 2 |a Manning (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/10000DIVC202334/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP