menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

>

BugBounty ...
source image

Medium

1M

read

422

img
dot

Image Credit: Medium

BugBounty — Mastering the Basics (along with Resources)[Part-3]

  • Bug bounty tools list categorized for reconnaissance, scanning, and exploitation purposes.
  • Tools for fast subdomains enumeration, in-depth attack surface mapping, DNS subdomain scanners and analysis features are listed.
  • Multiple web application security scanners, such as SQL injection and other injection detection and exploitation tools, are provided.
  • List of tools to find and exploit subdomain takeovers, and other misconfigured DNS records.
  • Resources for learning web application security like PentesterLab, Hack The Box, CTFTime, and vulnerable web applications, such as Juice Shop and WebGoat are offered.
  • Vulnerable cloud infrastructure creation through tools like Terraform and CloudGoat is discussed.
  • Also includes vulnerable mobile operating systems like Damn Insecure and Vulnerable App for Android, Oversecured Vulnerable Android App, and AndroGoat.
  • The author's contact information for feedback, suggestions, or discussion is shared.

Read Full Article

like

25 Likes

For uninterrupted reading, download the app