A Konami Code for Vuln Chaining Combos

Up, Up, Down, Down, Left, Right, Left, Right, B, A, Start
One of Many Examples of Vuln Chaining from my OWASP Presentation
Just a Small Fraction of Related Vulns in a MindMap I Created
I Imported all of Burp’s Findings Into a SQL Database and Created a Schema to Relate Issues and Create New Findings
More Tables that Create New Vulnerabilities out of Related Vulnerabilities
A Crude Web Application PoC With Conditional Logic to Walk Through Findings



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Curtis Brazzell

Curtis Brazzell

Passionate geek for Information/Cyber Security! I’m always learning and am happy to contribute anything I can share with the community. Follow me @ Twitter!