SPEED-UP RECON & PWN
ON BUG BOUNTY?
BUILD YOUR OWN TOOL!

Igor Lyrchikov & Egor Saltykov

We are going to talk about how to automate 95% of the actions that need to be carried out during the exploration process for bugbounty or pentest, as well as some of the vulnerabilities that for some reason are not checked by modern scanners or require the use of one-check utilities. We also made a single interface to manage this process. We will talk about how to build a modular and easily extensible architecture for the command center to automate the process of finding vulnerabilities.

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :