Slide 4
Slide 4 text
Methodology
Where do I start?
Create your own methodology
1. Recon
2. Look for “technical” bugs (RCE, SQLi, XXE, XSS, etc)
3. Look for “logical” bugs (IDOR, Priv Esc, Info Leak, etc)
Important to follow so you test everything possible