Главная
Study mode:
on
1
Introduction
2
The Problem
3
Agenda
4
About me
5
Scanners are bad at obscurity
6
Scanners are limited to specific languages
7
The million payload problem
8
Harnessing Intuition
9
Demo
10
Questions
11
What does work
12
Simple example
13
Random content
14
Scanning
15
Distribute Damage
16
Vulnerability
17
Partial Issues
18
Red X Injection
19
False Positives
20
Code Injection
21
destined to remain a mystery
22
HTTP parameter pollution
23
Identify backend parameters
24
Bruteforce attacks
25
enumerable parameters
26
Github pull
27
Summary
Description:
Explore advanced web scanning techniques in this 37-minute NorthSec conference talk by James Kettle. Dive into the development and implementation of an open-source scanner that uses a novel approach to detect both known and unknown injection vulnerabilities. Learn how this scanner leverages human intuition to overcome limitations of traditional scanners, offering benefits such as WAF evasion, minimal network footprint, and adaptability to input filtering. Discover key insights from the scanner's conception, development, and deployment on thousands of websites. Uncover advanced techniques for escalating vulnerabilities like HPP and JSON injection to RCE. Gain practical knowledge on interpreting complex findings and maximizing the scanner's effectiveness in your security testing. Walk through topics including scanner limitations, harnessing intuition, vulnerability detection, false positives, code injection, HTTP parameter pollution, and brute-force attacks.

Backslash Powered Scanning - Implementing Human Intuition

NorthSec
Add to list