BOOK THIS SPACE FOR AD
ARTICLE ADLesson 2: Cybersecurity overview
In the second lesson, we are taught about CIA triad, best safety practices and the different professions in cybersecurity. After the lesson, we have to solve this lab called “fisher”. In this article I’ll discuss how to solve the challenge.
Fisher is also a general information challenge worth 25 points.
Description
What is the job match the below definition?
Individuals who know the nuts and bolts of cybersecurity and are well versed in finding flaws and vulnerabilities. There are various bug bounty platforms that allow them to be paid to find vulnerabilities in applications and software. Flag format: flag{xxx xxxxxx xxxxxx}
Solution
The challenge describes someone who finds vulnerabilities and flaws in applications.From the description, I inferred that the job role is likely related to bug bounties where cybersecurity professionals find bugs then get paid.
Through a simple google search, you are able to find the flag easily.
The answer to this is flag{bug bounty hunter}.
Bug bounty hunters are cybersecurity professionals who are paid to find security vulnerabilities in software or web applications through platforms like Bugcrowd. Bug bounty is indeed an exciting profession.
Lets keep working hard and gaining valuable skills. Bye for now.
Happy hacking