1 min to read
Offensive OSINT for Finding Software Vulnerabilities
Let's find some bugs

Finding Software Vulnerabilities
I’m sure you have heard of Zero Days. They are bugs that have not been found by anyone. Imagine finding one of these and reporting it as a CVE before a malicious hacker does? YOU WOULD SAVE THE PLANET . All materials are freely available at cyber-ducky.com, and will remain available after the workshop ends.
Learning Objectives
- Learn how to analyze code from open source projects for common bugs.
- Learn how to look for potential vulnerabilities in documentation and developer forums.
- Learn how to do Software Composition Analysis.
- Learn how to leverage vulnerability databases for finding other issues.
Detailed Outline
We will demonstrate each of these topics briefly, and answer any questions individually as needed. All the materials will remain available after the workshop to anyone who wants to use them. For this workshop, I will demonstrate real world examples of myself going through the process of finding vulnerabilities.
Source Code Mining
- GitHub repository analysis
- Static Application Security Testing (SAST)
- Dynamic Application Security Testing (DAST)
- Advanced search operators
- Finding hard coded credentials
- Commit history analysis
- Issue tracking examination
Documentation Analysis
- API documentation review
- Technical specifications
- Developer forums
- Stack Overflow discussions
- Release notes/changelogs
Version Analysis
- Version Detection
- Dependency Tracking
- Software composition analysis
- Dependency tree analysis
- Version comparison tools
Public Vulnerability Research
- CVE Database Investigation
- NVD search techniques
- MITRE CVE analysis
- Exploit-DB correlation
- Bug bounty program reports
Practical Exercises
Exercise 1: Code Analysis on an Open Source Project
- Source Code Mining
- GitHub repository analysis
- Advanced search operators
- Finding hard coded credentials
- Commit history analysis
Exercise 2: Version Mining
- Select an open-source project
- Map its dependencies
- Cross-reference with CVE databases
- Document potential vulnerabilities
Exercise 3: Documentation Analysis
- Review public API docs
- Identify security implications
- Map potential attack surfaces
Comments