Exploiting Vulnerabilities Through Proper Reconnaissance

Presented at ShellCon 2018, Sept. 21, 2018, 2 p.m. (30 minutes).

Reconnaissance plays a huge role while hacking. While there are 100s of different tools available to make this process easier, you may not be maximizing your recon process without a working methodology. This methodology helps create an automated process that will actively look for vulnerabilities using OSINT and other well known recon tools.


Presenters:

  • Ben Sadeghipour / NahamSec as Ben Sadeghipour
    Ben works as the Hacker Operations Lead at HackerOne, the #1 most popular bug bounty platform by day, and a hacker by night. Prior to joining HackerOne, he has helped identify and exploit over 500 security vulnerabilities across 100s of web and mobile applications for companies such as Yahoo, Airbnb, Snapchat, The US Department of Defense, Yelp, Github, and more. He also invested time in the security community by creating a community of 200+ active hackers who share ideas and their experience. He has also held a few free workshops and trainings to teach others about security and web application hacking. Twitter: @nahamsec

Links:

Similar Presentations: