{"title":"Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications","authors":"Sanjib Sinha","doi":"10.1007/978-1-4842-5391-5","DOIUrl":"https://doi.org/10.1007/978-1-4842-5391-5","url":null,"abstract":"","PeriodicalId":171545,"journal":{"name":"Bug Bounty Hunting for Web Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116398394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Hunting Bugs","authors":"Sanjib Sinha","doi":"10.1007/978-1-4842-5391-5_1","DOIUrl":"https://doi.org/10.1007/978-1-4842-5391-5_1","url":null,"abstract":"","PeriodicalId":171545,"journal":{"name":"Bug Bounty Hunting for Web Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114500245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding HTML and SQL Injection Vulnerabilities","authors":"Sanjib Sinha","doi":"10.1007/978-1-4842-5391-5_10","DOIUrl":"https://doi.org/10.1007/978-1-4842-5391-5_10","url":null,"abstract":"","PeriodicalId":171545,"journal":{"name":"Bug Bounty Hunting for Web Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127635482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Exploit Through Cross-Site Scripting (XSS)","authors":"Sanjib Sinha","doi":"10.1007/978-1-4842-5391-5_4","DOIUrl":"https://doi.org/10.1007/978-1-4842-5391-5_4","url":null,"abstract":"","PeriodicalId":171545,"journal":{"name":"Bug Bounty Hunting for Web Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128800151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Setting Up Your Environment","authors":"Sanjib Sinha","doi":"10.1007/978-1-4842-4991-8_2","DOIUrl":"https://doi.org/10.1007/978-1-4842-4991-8_2","url":null,"abstract":"","PeriodicalId":171545,"journal":{"name":"Bug Bounty Hunting for Web Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Inject Request Forgery","authors":"Sanjib Sinha","doi":"10.1007/978-1-4842-5391-5_3","DOIUrl":"https://doi.org/10.1007/978-1-4842-5391-5_3","url":null,"abstract":"","PeriodicalId":171545,"journal":{"name":"Bug Bounty Hunting for Web Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Header Injection and URL Redirection","authors":"Sanjib Sinha","doi":"10.1007/978-1-4842-5391-5_5","DOIUrl":"https://doi.org/10.1007/978-1-4842-5391-5_5","url":null,"abstract":"","PeriodicalId":171545,"journal":{"name":"Bug Bounty Hunting for Web Security","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122707172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}