Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
The Bug Hunter’s Recon Methodology
Search
Tushar Verma
August 08, 2021
Technology
2
730
The Bug Hunter’s Recon Methodology
Tushar Verma
August 08, 2021
Tweet
Share
More Decks by Tushar Verma
See All by Tushar Verma
The Power of Recon_ Leveraging Recon for Easy $$$$
e11i0t_4lders0n
0
110
AWS Cloud Forensics & Incident Response
e11i0t_4lders0n
1
620
Hacking OAuth Applications
e11i0t_4lders0n
1
1.9k
Exploiting SSRF like a Boss
e11i0t_4lders0n
2
1k
How to Fail at Bug Bounty Hunting
e11i0t_4lders0n
1
1.7k
METHODOLOGIES AND APPROACH TO START BUG BOUNTY HUNTING
e11i0t_4lders0n
0
530
Bypassing 2FA Misconfiguration
e11i0t_4lders0n
1
2.2k
How to get started in bug bounty
e11i0t_4lders0n
1
450
Other Decks in Technology
See All in Technology
.NETの非同期戦略とUnityとの相互運用
neuecc
2
2.4k
Tohoku.Tech #1 「Cursorを使ったRaspberry Piの開発」by ねこまた
jun2882
0
250
生成AIサービスPanorama AIご説明資料
sdt
0
300
プッシュ型子育てサービスを、先行プロジェクト実施自治体において開始します
govtechtokyo
0
290
マイクロサービス環境におけるDB戦略 in DMMプラットフォーム
pospome
11
3k
SREsのためのSRE定着ガイド
netmarkjp
10
1.6k
技育祭2024春 LT Finatextホールディングス
kevinrobot34
1
170
データマネジメントを支える武器としてのメタデータ管理
10xinc
2
890
GraphQLに入門してみた
chiroruxx
2
130
Kubeflow Pipelines v2 で変わる機械学習パイプライン開発
asei
4
340
今さら聞けない!? AWSの生成AIサービス Amazon Bedrock入門!
minorun365
PRO
11
2.6k
10分でわかるfreeeのQA
freee
0
260
Featured
See All Featured
Fantastic passwords and where to find them - at NoRuKo
philnash
35
2.4k
10 Git Anti Patterns You Should be Aware of
lemiorhan
644
57k
The Language of Interfaces
destraynor
150
23k
CoffeeScript is Beautiful & I Never Want to Write Plain JavaScript Again
sstephenson
153
14k
Ruby is Unlike a Banana
tanoku
95
10k
YesSQL, Process and Tooling at Scale
rocio
160
13k
XXLCSS - How to scale CSS and keep your sanity
sugarenia
240
1.2M
[Rails World 2023 - Day 1 Closing Keynote] - The Magic of Rails
eileencodes
1
1.2k
"I'm Feeling Lucky" - Building Great Search Experiences for Today's Users (#IAC19)
danielanewman
219
21k
WebSockets: Embracing the real-time Web
robhawkes
59
6.9k
Building a Modern Day E-commerce SEO Strategy
aleyda
15
6.3k
The Cost Of JavaScript in 2023
addyosmani
13
3.7k
Transcript
The Bug Hunter’s Recon Methodology By: Tushar Verma
Whoami Application Security Engineer Synack Red Team Member Bug Bounty
Hunter Infosec Trainer & Speaker
Agenda Scope Review for any program Before Recon After Recon
Scope- based Recon Basic Methodolog y Tools and Automation frameworks
Scope review for any program • Assets • No of
reports resolved • Payout • Time to triage and Time to Bounty
Before Recon • Company name • Available scope • Overview
about the company business • Information from program page related to security purposes
After recon • Service info • Backend technology used •
Interesting Endpoints • Juicy links which may be vulnerable • More and more
Scope based recon • Small Scope Target-Single URL like domain
and subdomain(Ex. evil.com , info.evil.com • Medium Scope Target-Lists of subdomains(Ex. *.evil.com) • Large Scope Target-All website related to company is in scope
Basic Methodology Target : *.evil.com
Tools and Automation Framework ReconF TW Project Bheem Osmed eus
Get in touch at • Twitter: @e11i0t_4lders0n • LinkedIn: /in/tushars25
• Instagram: @e11i0t_4lders0n__ • Email:
[email protected]
Thank you