Overview
Syllabus
Intro
Contributions
The Problems
Current Solutions
Introducing HUNT
Level 1 - HUNT Scanner
Bug Location (Tribal Knowledge)
Vulnerability Locations
Advisory
SQL Injection
Server Side Request Forgery AAA
Insecure Direct Object Reference
Server Side Template Injection
Debug & Logic Parameters
HUNT Scanner Implementation
Level 2 - HUNT Methodology
Methodologies
Description
Multiple Request/Response
Resources
Notes
Methodology Implementation
Plugin Installation
Installation - Plugin
Setting Target Scope
Setting Passive Scanner Scope
Running the Passive Scanner
Scanner Extensibility
Methodology Extensibility
Taught by
OWASP Foundation