|Listed in category:
Have one to sell?

Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

Condition:
Like New
Price:
US $33.00
ApproximatelyEUR 30.39
Collection:
Free collection in person from Delcevo, Macedonia. See detailsfor collection
Postage:
US $14.00 (approx EUR 12.89) Flat Rate Freight. See detailsfor postage
Located in: Delcevo, Macedonia
Delivery:
Varies
Returns:
30 days return. Buyer pays for return postage. See details- for more information about returns
Payments:
    

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. 

Seller information

Registered as private seller, so consumer rights stemming from EU consumer protection law do not apply. eBay Money Back Guarantee still applies to most purchases.
Seller assumes all responsibility for this listing.
eBay item number:285733223495

Item specifics

Condition
Like New: A book that has been read, but looks new. The book cover has no visible wear, and the dust ...
ISBN
9781718501546
Publication Year
2021
Type
Textbook
Format
Trade Paperback
Language
English
Publication Name
Bug Bounty Bootcamp : the Guide to Finding and Reporting Web Vulnerabilities
Item Height
0.9in
Author
Vickie Li
Item Length
9.3in
Publisher
No Starch Press, Incorporated
Item Width
7.1in
Item Weight
26.9 Oz
Number of Pages
416 Pages

About this product

Product Information

Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bugs in their web applications. Bug bounty programs are company-sponsored programs that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry. You'll start by learning how to choose a program, write quality bug reports, and maintain professional relationships in the industry. Then you'll learn how to set up a web hacking lab and use a proxy to capture traffic. In Part 3 of the book, you'll explore the mechanisms of common web vulnerabilities, like XSS, SQL injection, and template injection, and receive detailed advice on how to find them and bypass common protections. You'll also learn how to chain multiple bugs to maximize the impact of your vulnerabilities. Finally, the book touches on advanced techniques rarely covered in introductory hacking books but that are crucial to understand to hack web applications. You'll learn how to hack mobile apps, review an application's source code for security issues, find vulnerabilities in APIs, and automate your hacking process. By the end of the book, you'll have learned the tools and techniques necessary to be a competent web hacker and find bugs on a bug bounty program.

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1718501544
ISBN-13
9781718501546
eBay Product ID (ePID)
8050410434

Product Key Features

Author
Vickie Li
Publication Name
Bug Bounty Bootcamp : the Guide to Finding and Reporting Web Vulnerabilities
Format
Trade Paperback
Language
English
Publication Year
2021
Type
Textbook
Number of Pages
416 Pages

Dimensions

Item Length
9.3in
Item Height
0.9in
Item Width
7.1in
Item Weight
26.9 Oz

Additional Product Features

Lc Classification Number
Tk5105.8855.L523
Reviews
"A really good book for getting started in Bug Bounty, out at a time when something like this was really needed. You can take as many ethical hacking courses as you want, but when it comes to bug bounty, there is so much information and tools it can be imitating to start . . . This really should be the first book read by ANYONE looking to start in the bug bounty game." --Alex/Muldwych, The Security Noob " Bug Bounty Bootcamp should be on every hacker''s shelf. Vickie Li answers an important question: ''So you found your first flaw, what''s next?'' By explaining how to write a bug report and interact with clients, she presents a wonderful guide on starting your security career." --Andrew Orr, Associate Editor, The Mac Observer "I have enjoyed Bug Bounty Bootcamp over the past few weeks and this is great for bug bounty beginners like myself. Anyone who is interested in learning more about different web vulnerabilities, bug bounty platforms, how the internet works, and how to make money making the web safer this is the book for you. Thanks to Vickie for writing such a great book!" --The Digital Empress, YouTuber and Blogger " Bug Bounty Bootcamp by Vickie Li is a thorough and masterful explanation for how to find bugs and responsibly report them. It is written so clearly, and provides such useful step-by-step instructions that as I was reading it, I was tempted to start hunting for bugs myself." --Cynthia Brumfield, President, DCT-Associates "I highly suggest reading Bug Bounty Bootcamp ." --@HolyBugx "Pure GEM. Learned a lot of things from her book." --Aakash Choudhary, @LearnerHunter "Loved the book. Well written, clear, concise, and easy to follow. Everyone from the beginner bug hunter to the seasoned pro will find a nugget, some nuggets or just pure nuggets of amazing information, tips and advice." --Douglas Campbell, Advanced Reviewer "The only book you need to get started in bug bounty is @vickieli7''s book coming out from @nostarch, Bug Bounty Bootcamp . It''s a detailed how-to with lots of technical how-to steps." --Metacurity, Top Infosec News Destination, @Metacurity "The new go-to resource for a beginner in web app hacking . . . I recommend this book before anything else for a beginner trying to learn web security. Vickie provides an excellent delivery of breaking down complex concepts that makes it easy to comprehend. Also, the step by step guidance of exploiting a vulnerability is fantastic to refer back to . . . If you are a complete beginner and feel confused or lost in all of the information out there then stop, grab this book, read through it once, then use it as your guide." --AntiRuse, @AntiRuse, Blogger "Definitely recommend it!" --Michael, @DoAbarrel_Troll " Bug Bounty Bootcamp is *the* book for everyone in Information Technology, not just those interested in bug bounties . . . This easy-to-read guide breaks down complicated topics into a simple progression through technical concepts. From a foundational overview of the industry and how to get started, the reader progresses from Cross Site Scripting all the way through to API hacking and use of Fuzzers. Vickie Li has done a tremendous service to information security by sharing her expert understanding of bug hunting in a highly accessible way. Recommended reading for all IT professionals, new or veteran." --Jess Vachon, Advanced Reviewer "Vicki Li''s book took me from knowing nothing about bug bounties, to finding my first bug. Li goes over the process of bug bounties, writing reports, and how to make relationships with companies. Li also has expert techniques that will help your automate your hacking experience and even hacking android apps." --Anthony Ware, Advanced Reviewer, "I highly suggest reading Bug Bounty Bootcamp ." --@HolyBugx "Pure GEM. Learned a lot of things from her book." --Aakash Choudhary, @LearnerHunter
Table of Content
Introduction Introduction Part I: The Industry Chapter 1: Picking a Bug Bounty Program Chapter 2: Sustaining Your Success Part II: Getting Started Chapter 3: How the Internet Works Chapter 4: Environmental Setup and Traffic Interception Chapter 5: Web Hacking Reconnaissance Part III: Web Vulnerabilities Chapter 6: Cross-Site Scripting Chapter 7: Open Redirects Chapter 8: Clickjacking Chapter 9: Cross-Site Request Forgery Chapter 10: Insecure Direct Object Reference Chapter 11: SQL Injection Chapter 12: Race Conditions Chapter 13: Server-Side Request Forgery Chapter 14: Insecure Deserialization Chapter 15: XML External Entity Vulnerabilities Chapter 16: Template Injection Chapter 17: Application Logic Errors and Broken Access Control Chapter 18: Remote Code Execution Chapter 19: Same Origin Policy Issues Chapter 20: Single Sign-on Issues Chapter 21: Information Disclosure Part IV: Expert Techniques Chapter 22: Conducting Code Reviews Chapter 23: Hacking Android Apps Chapter 24: API Hacking Chapter 25: Automatic Vulnerability Discovery Using Fuzzers Index
Topic
Software Development & Engineering / Quality Assurance & Testing, Engineering (General), Web / Web Programming, Security / Networking
Lccn
2021-023153
Dewey Decimal
025.042
Intended Audience
Trade
Dewey Edition
23
Illustrated
Yes
Genre
Computers, Technology & Engineering

Item description from the seller

dimitrovski

dimitrovski

100% positive Feedback
68 items sold
Registered as a private seller
Thereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.

Seller Feedback (14)

s***e (34)- Feedback left by buyer.
Past month
Verified purchase
Excellent condition, the book was brand new. Seller was extremely helpful and communicative. Thanks for the cheap offer in this incredible book!
1***3 (3)- Feedback left by buyer.
Past 6 months
Verified purchase
Quick delivery, accurate description and good communication.
g***g (282)- Feedback left by buyer.
Past 6 months
Verified purchase
Book received in VERY good condition. Thank you
This is a private listing and your identity will not be disclosed to anyone except the seller.