mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-18 10:56:09 +00:00
Update scope_example.md
This commit is contained in:
parent
9bf645aff9
commit
27e4851237
@ -20,9 +20,7 @@ Briefly describe the objectives of your bug bounty program and what you hope to
|
|||||||
|
|
||||||
### Out-of-Scope Targets
|
### Out-of-Scope Targets
|
||||||
|
|
||||||
- Internal Systems (192.168.x.x)
|
- app3.websploit.org
|
||||||
- Third-party Applications or Plugins
|
|
||||||
- Subdomain3.websploit.org
|
|
||||||
|
|
||||||
## Vulnerability Types
|
## Vulnerability Types
|
||||||
|
|
||||||
@ -37,13 +35,6 @@ Briefly describe the objectives of your bug bounty program and what you hope to
|
|||||||
|
|
||||||
- Denial of Service (DoS) attacks
|
- Denial of Service (DoS) attacks
|
||||||
- Social Engineering Attacks
|
- Social Engineering Attacks
|
||||||
- Physical Attacks
|
|
||||||
|
|
||||||
## Testing Methods
|
|
||||||
|
|
||||||
- Automated Scanning (Specify permitted tools)
|
|
||||||
- Manual Code Review
|
|
||||||
- Penetration Testing (Specify guidelines)
|
|
||||||
|
|
||||||
## Reward Structure
|
## Reward Structure
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user