![]() You don’t want to have an engagement delayed or have time wasted by not having the necessary infrastructure in place. Once everything is mapped out you can execute the play and start finding vulnerabilities!Ĭhapter 1: Pre-Game - Infrastructure Introductionīefore you start an engagement, you need to set up the necessary infrastructure. The key to a successful hunt is to do some pre-game planning to ensure you are setting yourself up for success! Start by establishing your infrastructure, finding your knowledge base, identifying and securing the tools you will use, and creating a general game plan outlining how you will work through the process.this is your play. Jumping in feet first without identifying the goal and knowing the play which will help you get there will lessen your chances of finding vulnerabilities, and ultimately minimize the potential to make a profit from your bug bounty hunting. ![]() Section 1: Pre-Game Introduction Every game has a playbook the breakdown of actions (plays) you chose to follow to work through a process. ![]() ![]() This book or any portion thereof may not be reproduced or used in any manner whatsoever without the express written permission of the publisher except for the use of brief quotations in a book review. P a g e | 10 Unauthenticated Elasticsearch DB Section 3: Exploitation Phase Introduction Page |3 Chapter 3: Pre Game - Knowledge BaseĬhapter 7: Reconnaissance Phase 2 Wordlist ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |