-
Book Overview & Buying
-
Table Of Contents
The Vulnerability Researcher's Handbook
By :
The Vulnerability Researcher's Handbook
By:
Overview of this book
Vulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with the adoption and use of technology. To begin your journey of becoming a security researcher, you need more than just the technical skills to find vulnerabilities; you’ll need to learn how to adopt research strategies and navigate the complex and frustrating process of sharing your findings. This book provides an easy-to-follow approach that will help you understand the process of discovering, disclosing, and publishing your first zero-day vulnerability through a collection of examples and an in-depth review of the process.
You’ll begin by learning the fundamentals of vulnerabilities, exploits, and what makes something a zero-day vulnerability. Then, you'll take a deep dive into the details of planning winning research strategies, navigating the complexities of vulnerability disclosure, and publishing your research with sometimes-less-than-receptive vendors.
By the end of the book, you'll be well versed in how researchers discover, disclose, and publish vulnerabilities, navigate complex vendor relationships, receive credit for their work, and ultimately protect users from exploitation. With this knowledge, you’ll be prepared to conduct your own research and publish vulnerabilities.
Table of Contents (16 chapters)
Preface
Part 1– Vulnerability Research Fundamentals
Chapter 1: An Introduction to Vulnerabilities
Chapter 2: Exploring Real-World Impacts of Zero-Days
Chapter 3: Vulnerability Research – Getting Started with Successful Strategies
Part 2 – Vulnerability Disclosure, Publishing, and Reporting
Chapter 4: Vulnerability Disclosure – Communicating Security Findings
Chapter 5: Vulnerability Publishing –Getting Your Work Published in Databases
Chapter 6: Vulnerability Mediation – When Things Go Wrong and Who Can Help
Chapter 7: Independent Vulnerability Publishing
Part 3 – Case Studies, Researcher Resources, and Vendor Resources
Chapter 8: Real-World Case Studies – Digging into Successful (and Unsuccessful) Research Reporting
Chapter 9: Working with Security Researchers – A Vendor’s Guide
Chapter 10: Templates, Resources, and Final Guidance
Index