Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
The Bug Hunter’s Recon Methodology
Search
Tushar Verma
August 08, 2021
Technology
800
2
Share
The Bug Hunter’s Recon Methodology
Tushar Verma
August 08, 2021
More Decks by Tushar Verma
See All by Tushar Verma
The Power of Recon_ Leveraging Recon for Easy $$$$
e11i0t_4lders0n
0
220
AWS Cloud Forensics & Incident Response
e11i0t_4lders0n
1
720
Hacking OAuth Applications
e11i0t_4lders0n
1
2.1k
Exploiting SSRF like a Boss
e11i0t_4lders0n
2
1.1k
How to Fail at Bug Bounty Hunting
e11i0t_4lders0n
1
1.7k
METHODOLOGIES AND APPROACH TO START BUG BOUNTY HUNTING
e11i0t_4lders0n
0
610
Bypassing 2FA Misconfiguration
e11i0t_4lders0n
1
2.4k
How to get started in bug bounty
e11i0t_4lders0n
1
500
Other Decks in Technology
See All in Technology
Sansan Engineering Unit 紹介資料
sansan33
PRO
1
4.2k
Code Interpreter で、AIに安全に コードを書かせる。
yokomachi
0
6.5k
Bluesky Meetup in Tokyo vol.4 - 2023to2026
shinoharata
0
190
2026年に相応しい 最先端プラグインホストの設計<del>と実装</del>
atsushieno
0
120
レビューしきれない?それは「全て人力でのレビュー」だからではないでしょうか
amixedcolor
0
110
ある製造業の会社全体のAI化に1エンジニアが挑んだ話
kitami
2
1k
Contract One Engineering Unit 紹介資料
sansan33
PRO
0
16k
AWS認定資格は本当に意味があるのか?
nrinetcom
PRO
1
240
The Journey of Box Building
tagomoris
4
240
[OpsJAWS 40]リリースしたら終わり、じゃなかった。セキュリティ空白期間をAWS Security Agentで埋める
sh_fk2
3
170
3つのボトルネックを解消し、リリースエンジニアリングを再定義した話
nealle
0
500
生成AI時代のエンジニア育成 変わる時代と変わらないコト
starfish719
0
7.9k
Featured
See All Featured
ラッコキーワード サービス紹介資料
rakko
1
3M
sira's awesome portfolio website redesign presentation
elsirapls
0
210
The Art of Delivering Value - GDevCon NA Keynote
reverentgeek
16
1.9k
Building Adaptive Systems
keathley
44
3k
Google's AI Overviews - The New Search
badams
0
970
The Invisible Side of Design
smashingmag
302
51k
Kristin Tynski - Automating Marketing Tasks With AI
techseoconnect
PRO
0
220
Skip the Path - Find Your Career Trail
mkilby
1
100
The Cost Of JavaScript in 2023
addyosmani
55
9.8k
Java REST API Framework Comparison - PWX 2021
mraible
34
9.3k
Site-Speed That Sticks
csswizardry
13
1.2k
JAMstack: Web Apps at Ludicrous Speed - All Things Open 2022
reverentgeek
1
420
Transcript
The Bug Hunter’s Recon Methodology By: Tushar Verma
Whoami Application Security Engineer Synack Red Team Member Bug Bounty
Hunter Infosec Trainer & Speaker
Agenda Scope Review for any program Before Recon After Recon
Scope- based Recon Basic Methodolog y Tools and Automation frameworks
Scope review for any program • Assets • No of
reports resolved • Payout • Time to triage and Time to Bounty
Before Recon • Company name • Available scope • Overview
about the company business • Information from program page related to security purposes
After recon • Service info • Backend technology used •
Interesting Endpoints • Juicy links which may be vulnerable • More and more
Scope based recon • Small Scope Target-Single URL like domain
and subdomain(Ex. evil.com , info.evil.com • Medium Scope Target-Lists of subdomains(Ex. *.evil.com) • Large Scope Target-All website related to company is in scope
Basic Methodology Target : *.evil.com
Tools and Automation Framework ReconF TW Project Bheem Osmed eus
Get in touch at • Twitter: @e11i0t_4lders0n • LinkedIn: /in/tushars25
• Instagram: @e11i0t_4lders0n__ • Email:
[email protected]
Thank you