Главная
Study mode:
on
1
Intro
2
Contributions
3
The Problems
4
Current Solutions
5
Introducing HUNT
6
Level 1 - HUNT Scanner
7
Bug Location (Tribal Knowledge)
8
Vulnerability Locations
9
Advisory
10
SQL Injection
11
Server Side Request Forgery AAA
12
Insecure Direct Object Reference
13
Server Side Template Injection
14
Debug & Logic Parameters
15
HUNT Scanner Implementation
16
Level 2 - HUNT Methodology
17
Methodologies
18
Description
19
Multiple Request/Response
20
Resources
21
Notes
22
Methodology Implementation
23
Plugin Installation
24
Installation - Plugin
25
Setting Target Scope
26
Setting Passive Scanner Scope
27
Running the Passive Scanner
28
Scanner Extensibility
29
Methodology Extensibility
Description:
Explore a comprehensive 44-minute conference talk from AppSecUSA 2017 that introduces HUNT, a powerful Burp Suite extension designed to enhance web hacking and manual testing. Learn how this data-driven tool leverages real-world vulnerability data to provide parameter-level suggestions for identifying critical issues like SQL Injection, Command Injection, and File Inclusion vulnerabilities. Discover how HUNT aims to organize common web hacking methodologies within Burp Suite, making it easier to assess large, complex applications more thoroughly. Gain insights into the tool's core functionality, data-driven design, and its potential to turbocharge web hacking without sacrificing efficiency.

HUNT: Data-Driven Web Hacking and Manual Testing

OWASP Foundation
Add to list