-
Book Overview & Buying
-
Table Of Contents
The Vulnerability Researcher's Handbook
By :
In this chapter, we learned about what vulnerability research is and how to conduct it. We also looked at some of the most common techniques used in vulnerability research. We explored various types of strategies and resources that are utilized to discover new vulnerabilities. We also learned about some of the challenges faced by vulnerability researchers. We learned how to select the best targets for research. We dug into test cases and how they’re an important method that can help you become more effective in finding vulnerabilities. We also learned which tools to become familiar with as we embark on our careers as vulnerability researchers.
All this information will be very useful as we conduct our own vulnerability research in the future and should have you setting out on your path of beginning your research. Though, when your research inevitably develops into the discovery of security vulnerabilities, what do you need to do next? In our next chapter, we’...
Change the font size
Change margin width
Change background colour