Where to start, if you want it for money?
文章讨论了记录安全漏洞和利用的最佳实践,包括区分漏洞与利用、使用模糊测试和逆向工程等技术方法。详细文档应包含漏洞描述、复现步骤、影响分析及修复建议,并强调负责任披露与法律合规。此外,介绍了CVE提交及OSINT工具等资源。 2025-12-11 21:47:14 Author: www.reddit.com(查看原文) 阅读量:0 收藏

Documenting security exploits is a critical practice in cybersecurity, helping to inform others, facilitate fixes, and ensure proper recognition for discoveries. Here are some best practices and insights from Redditors on how to document security exploits:

General Practices

Documentation Steps

  1. Detail the Vulnerability: Clearly describe the vulnerability, its type (e.g., SQL injection, XSS), and the conditions under which it can be exploited. "Broken object level authorization. I find it on almost every web app/API test."

  2. Provide Steps to Reproduce: Include a step-by-step guide on how to reproduce the exploit. This is crucial for developers to understand and fix the issue. "I accidentally figured out a method where I can gain access to any client account as long as I know the email address."

  3. Explain the Impact: Describe the potential impact of the exploit, such as data breaches, unauthorized access, or service disruption. "The company provides house appliances devices and offers laundry services to institutions (B2B type of model). My question is simple: what do I do now?"

  4. Suggest Mitigations: Offer recommendations for how to fix the vulnerability. "Do you have a policy in place: eg vulnerabilities with CVSS3 score of 8-10 must be fixed with 7 days, CVSS3 score 6-7 14 days etc?"

Ethical Considerations

Tools and Resources

Additional Tips

Subreddits for Further Questions

These practices and resources should help you effectively document security exploits and navigate the ethical and legal considerations involved.


文章来源: https://www.reddit.com/r/blackhat/comments/1pka0ig/where_to_start_if_you_want_it_for_money/
如有侵权请联系:admin#unsafe.sh