top of page
  • Writer's pictureInfosec In the City (IIC)

Speed-Up Recon & Pwn On Bug Bounty? Build Your Own Tool! — by Igor Lyrchikov & Egor Saltykov

#IICSG2019 Conference Insights Track

Day 2 (20 Jun 2019)


@ Breakout Room 2


We are going to talk about how to automate 95% of the actions that need to be carried out during the exploration process for bug bounty or pentest, as well as some of the vulnerabilities that for some reason are not checked by modern scanners or require the use of one-check utilities. We also made a single interface to manage this process. We will talk about how to build a modular and easily extensible architecture for the command center to automate the process of finding vulnerabilities.

23 views0 comments


Post: Blog2_Post
bottom of page