Backslash Powered Scanning - Hunting Unknown Vulnerability Classes

Backslash Powered Scanning - Hunting Unknown Vulnerability Classes

Black Hat via YouTube Direct link

what we need

8 of 24

8 of 24

what we need

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Backslash Powered Scanning - Hunting Unknown Vulnerability Classes

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Background
  3. 3 Outline
  4. 4 Port Swagger
  5. 5 Security through obscurity
  6. 6 Security through wellknown languages
  7. 7 scanners cant do that
  8. 8 what we need
  9. 9 payload
  10. 10 baseline
  11. 11 response analysis
  12. 12 performance issues
  13. 13 random content
  14. 14 cosmetic changes
  15. 15 running the scanner on 2000 sites
  16. 16 distributing damage
  17. 17 scanning results
  18. 18 PHP code injection
  19. 19 Regex injection
  20. 20 False positives
  21. 21 Intelligence
  22. 22 ResearchGrade
  23. 23 Teslas
  24. 24 Input Enumeration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.