bmt 0.7.0 → 0.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/bmt/version.rb +1 -1
- data/lib/data/0.1/methodologies/ai_llm.json +278 -515
- data/lib/data/0.1/methodologies/api_testing.json +52 -24
- data/lib/data/0.1/methodologies/hardware_testing.json +216 -0
- metadata +8 -7
@@ -1,7 +1,7 @@
|
|
1
1
|
{
|
2
2
|
"metadata": {
|
3
3
|
"title": "API Testing",
|
4
|
-
"release_date": "
|
4
|
+
"release_date": "2025-04-29T00:00:00+00:00",
|
5
5
|
"description": "Bugcrowd api methodology testing",
|
6
6
|
"vrt_version": "10.0.1"
|
7
7
|
},
|
@@ -20,9 +20,9 @@
|
|
20
20
|
"caption": ""
|
21
21
|
},
|
22
22
|
{
|
23
|
-
"key": "
|
24
|
-
"title": "Check for .wsdl files",
|
25
|
-
"description": "Check for web service description language (.wsdl) files for SOAP APIs.",
|
23
|
+
"key": "check_api_schema_files",
|
24
|
+
"title": "Check for .wsdl, .wadl, and swagger files",
|
25
|
+
"description": "Check for web service description language (.wsdl/.wadl) and swagger files for SOAP/REST APIs.",
|
26
26
|
"tools": "Burp Proxy, FFUF, WFuzz, Gobuster",
|
27
27
|
"caption": ""
|
28
28
|
},
|
@@ -30,14 +30,21 @@
|
|
30
30
|
"key": "check_graphql_introspection",
|
31
31
|
"title": "Check for GraphQL Introspection",
|
32
32
|
"description": "Check for enabled Introspection using GraphQL query.",
|
33
|
-
"tools": "Burp Proxy + GraphQL Raider (BAPP)",
|
33
|
+
"tools": "Burp Proxy + GraphQL Raider (BAPP), InQL (BurpSuite extension)",
|
34
|
+
"caption": ""
|
35
|
+
},
|
36
|
+
{
|
37
|
+
"key": "check_graphql_field_suggestions",
|
38
|
+
"title": "Check for GraphQL Field Suggestions",
|
39
|
+
"description": "Check for GraphQL Field Suggestions if Introspection Disabled.",
|
40
|
+
"tools": "Clairvoyance",
|
34
41
|
"caption": ""
|
35
42
|
},
|
36
43
|
{
|
37
44
|
"key": "search_leaked_api_keys",
|
38
45
|
"title": "Search for leaked API Keys",
|
39
46
|
"description": "Black box only - Search for leaked online API keys on Github, Gitlab etc.",
|
40
|
-
"tools": "TruffleHog",
|
47
|
+
"tools": "TruffleHog, Gitleaks",
|
41
48
|
"caption": ""
|
42
49
|
},
|
43
50
|
{
|
@@ -52,7 +59,7 @@
|
|
52
59
|
"key": "webserver_metafiles",
|
53
60
|
"title": "Review Webserver Metafiles for Information Leakage",
|
54
61
|
"caption": "OTG-INFO-003, WAHHM - Recon and Analysis",
|
55
|
-
"description": "Analyze robots.txt and identify <META> Tags from website.",
|
62
|
+
"description": "Analyze robots.txt, .env, .git, metrics and identify <META> Tags from website.",
|
56
63
|
"tools": "Browser, curl, wget"
|
57
64
|
},
|
58
65
|
{
|
@@ -238,6 +245,13 @@
|
|
238
245
|
"caption": "OTG-AUTHN-010, WAHHM - Test Handling of Access",
|
239
246
|
"description": "Understand the primary mechanism and Identify other channels (Mobile App, Call center, SSO)",
|
240
247
|
"tools": "Browser"
|
248
|
+
},
|
249
|
+
{
|
250
|
+
"key": "jwt_misconfigurations",
|
251
|
+
"title": "Testing for misconfigured JWT (Json Web Token)",
|
252
|
+
"caption": "OWASP API Security Top 10 - 2023",
|
253
|
+
"description": "Identify JWT flaws like allowing the None algorithm, algorithm confusion, weak secret keys, missing signature validation, etc.",
|
254
|
+
"tools": "jwt_tool"
|
241
255
|
}
|
242
256
|
]
|
243
257
|
},
|
@@ -279,14 +293,6 @@
|
|
279
293
|
"tools": "Burp Proxy, curl, swagger-ui, mitmproxy, Hackverter",
|
280
294
|
"vrt_category": "broken_access_control"
|
281
295
|
},
|
282
|
-
{
|
283
|
-
"key": "directory_traversal_and_file_include",
|
284
|
-
"title": "Testing Directory traversal/file include",
|
285
|
-
"caption": "OTG-AUTHZ-001, WAHHM - Test Handling of Input",
|
286
|
-
"description": "dot-dot-slash attack (../), Directory traversal, Local File inclusion/Remote File Inclusion.",
|
287
|
-
"tools": "Burp Proxy, ZAP, Wfuzz",
|
288
|
-
"vrt_category": "server_side_injection"
|
289
|
-
},
|
290
296
|
{
|
291
297
|
"key": "privilege_escalation",
|
292
298
|
"title": "Testing for Privilege Escalation",
|
@@ -438,7 +444,7 @@
|
|
438
444
|
"key": "nosql_injection",
|
439
445
|
"title": "Testing for NoSQL injection",
|
440
446
|
"caption": "",
|
441
|
-
"description": "
|
447
|
+
"description": "Identify NoSQL databases, Pass special characters (' \" \\ ; { } ), and attack with reserved variable names and operators.",
|
442
448
|
"tools": "NoSQLMap"
|
443
449
|
},
|
444
450
|
{
|
@@ -511,6 +517,30 @@
|
|
511
517
|
"description": "Understand the application platform, OS, folder structure, relative path and execute OS commands on a Web server.\n%3Bcat%20/etc/passwd\ntest.pdf+|+Dir C:\\ ",
|
512
518
|
"tools": "Burp Proxy, ZAP, Commix",
|
513
519
|
"vrt_category": "server_side_injection"
|
520
|
+
},
|
521
|
+
{
|
522
|
+
"key": "ssrf",
|
523
|
+
"title": "Testing for Server-Side Request Forgery",
|
524
|
+
"caption": "OWASP API Security Top 10 - 2023",
|
525
|
+
"description": "Test whether the API allows sending arbitrary or internal requests to unauthorized systems.\nUse crafted URLs to target internal IP ranges, cloud metadata endpoint (e.g., http://169.254.169.254/)",
|
526
|
+
"tools": "Burp Collaborator, SSRFmap",
|
527
|
+
"vrt_category": "server_security_misconfiguration"
|
528
|
+
},
|
529
|
+
{
|
530
|
+
"key": "graphql_misconfigurations",
|
531
|
+
"title": "Testing for GraphQL Misconfigurations",
|
532
|
+
"caption": "WSTG - v4.2",
|
533
|
+
"description": "Test GraphQL endpoint for batched abuse and alias overloading, and recursion depth limits, etc.",
|
534
|
+
"tools": "GraphQL Raider, BurpSuite",
|
535
|
+
"vrt_category": "server_security_misconfiguration"
|
536
|
+
},
|
537
|
+
{
|
538
|
+
"key": "directory_traversal_and_file_include",
|
539
|
+
"title": "Testing Directory traversal/file include",
|
540
|
+
"caption": "OTG-AUTHZ-001, WAHHM - Test Handling of Input",
|
541
|
+
"description": "dot-dot-slash attack (../), Directory traversal, Local File inclusion/Remote File Inclusion.",
|
542
|
+
"tools": "Burp Proxy, ZAP, Wfuzz",
|
543
|
+
"vrt_category": "server_side_injection"
|
514
544
|
}
|
515
545
|
]
|
516
546
|
},
|
@@ -572,7 +602,7 @@
|
|
572
602
|
"key": "data_validation",
|
573
603
|
"title": "Test Business Logic Data Validation",
|
574
604
|
"caption": "OTG-BUSLOGIC-001, WAHHM - Test for Logic Flaws",
|
575
|
-
"description": "
|
605
|
+
"description": "Identify data entry points or hand off points between systems or software.\nOnce identified, insert logically invalid data into the application/system.",
|
576
606
|
"tools": "Burp Proxy, ZAP",
|
577
607
|
"vrt_category": "broken_access_control"
|
578
608
|
},
|
@@ -580,7 +610,7 @@
|
|
580
610
|
"key": "forge_requests",
|
581
611
|
"title": "Test Ability to Forge Requests",
|
582
612
|
"caption": "OTG-BUSLOGIC-002, WAHHM - Test for Logic Flaws",
|
583
|
-
"description": "
|
613
|
+
"description": "Identify guessable, predictable or hidden functionality of fields.\nOnce found, try to insert logically valid data into the application/system allowing the user to go through the application/system against the normal business logic workflow.",
|
584
614
|
"tools": "Burp Proxy, ZAP",
|
585
615
|
"vrt_category": "server_side_injection"
|
586
616
|
},
|
@@ -588,7 +618,7 @@
|
|
588
618
|
"key": "integrity_check",
|
589
619
|
"title": "Test Integrity Checks",
|
590
620
|
"caption": "OTG-BUSLOGIC-003, WAHHM - Test for Logic Flaws",
|
591
|
-
"description": "
|
621
|
+
"description": "Identify parts of the application/system (components, for example, input fields, databases or logs) that move, store or handle data/information.\nFor each identified component determine what type of data/information is logically acceptable and what types the application/system should guard against. Also, consider who according to the business logic is allowed to insert, update and delete data/information and in each component.\nAttempt to insert, update or delete the data/information values with invalid data/information into each component (i.e. input, database, or log) by users that should not be allowed per the business logic workflow.",
|
592
622
|
"tools": "Burp Proxy, ZAP",
|
593
623
|
"vrt_category": "broken_access_control"
|
594
624
|
},
|
@@ -596,7 +626,7 @@
|
|
596
626
|
"key": "process_timing",
|
597
627
|
"title": "Test for Process Timing",
|
598
628
|
"caption": "OTG-BUSLOGIC-004, WAHHM - Test for Logic Flaws",
|
599
|
-
"description": "
|
629
|
+
"description": "Identify application/system functionality that may be impacted by time. Such as execution time or actions that help users predict a future outcome or allow one to circumvent any part of the business logic or workflow. For example, not completing transactions in an expected time.\nDevelop and execute the mis-use cases ensuring that attackers cannot gain an advantage based on any timing.",
|
600
630
|
"tools": "Burp Proxy, ZAP",
|
601
631
|
"vrt_category": "server_side_injection"
|
602
632
|
},
|
@@ -604,7 +634,7 @@
|
|
604
634
|
"key": "usage_limits",
|
605
635
|
"title": "Test Number of Times a Function Can be Used Limits",
|
606
636
|
"caption": "OTG-BUSLOGIC-005, WAHHM - Test for Logic Flaws",
|
607
|
-
"description": "
|
637
|
+
"description": "Identify functions or features in the application or system that should not be executed more than a single time or specified number of times during the business logic workflow.\nFor each of the functions and features found that should only be executed a single time or specified number of times during the business logic workflow, develop abuse/misuse cases that may allow a user to execute more than the allowable number of times.",
|
608
638
|
"tools": "Burp Proxy, ZAP",
|
609
639
|
"vrt_category": "broken_access_control"
|
610
640
|
},
|
@@ -612,7 +642,7 @@
|
|
612
642
|
"key": "workflow_circumvention",
|
613
643
|
"title": "Testing for the Circumvention of Work Flows",
|
614
644
|
"caption": "OTG-BUSLOGIC-006, WAHHM - Test for Logic Flaws",
|
615
|
-
"description": "
|
645
|
+
"description": "Identify methods to skip or go to steps in the application process in a different order from the designed/intended business logic flow.\nFor each method develop a misuse case and try to circumvent or perform an action that is 'not acceptable' per the business logic workflow.",
|
616
646
|
"tools": "Burp Proxy, ZAP",
|
617
647
|
"vrt_category": "broken_access_control"
|
618
648
|
},
|
@@ -655,5 +685,3 @@
|
|
655
685
|
]
|
656
686
|
}
|
657
687
|
}
|
658
|
-
|
659
|
-
|
@@ -0,0 +1,216 @@
|
|
1
|
+
{
|
2
|
+
"metadata": {
|
3
|
+
"title": "Hardware",
|
4
|
+
"release_date": "2025-08-29T00:00:00+00:00",
|
5
|
+
"description": "Bugcrowd Hardware Testing Methodology",
|
6
|
+
"vrt_version": "1.17"
|
7
|
+
},
|
8
|
+
"content": {
|
9
|
+
"steps": [
|
10
|
+
{
|
11
|
+
"key": "passive_recon",
|
12
|
+
"title": "Passive Recon",
|
13
|
+
"description": "Information gathering before turning off or opening the device",
|
14
|
+
"type": "checklist",
|
15
|
+
"items": [
|
16
|
+
{
|
17
|
+
"key": "open_source_intelligence",
|
18
|
+
"title": "Open Source Intelligence",
|
19
|
+
"caption": "",
|
20
|
+
"description": "Gathering information using search engines to find publicly available information about the device",
|
21
|
+
"tools": "Google Dorking components/device, FCC Database (fccid.io or fcc.io), Patents (patents.google.com, worldwide.espacenet.com/patent, appft.uspto.gov), Chinese OSINT (baidu.com, qichacha.com, right.com.cn, codechina.csdn.net, pudn.com, search.gitee.com), Finding datasheets for components",
|
22
|
+
"vrt_category": "sensitive_data_exposure"
|
23
|
+
},
|
24
|
+
{
|
25
|
+
"key": "network_scanning",
|
26
|
+
"title": "Network Scanning",
|
27
|
+
"caption": "",
|
28
|
+
"description": "Scan the network for devices to find the one being tested, identify wireless protocols in use",
|
29
|
+
"tools": "NMAP, Wireshark, tcpdump"
|
30
|
+
},
|
31
|
+
{
|
32
|
+
"key": "rf_scanning",
|
33
|
+
"title": "Radio Frequency Scanning",
|
34
|
+
"caption": "",
|
35
|
+
"description": "Identify any radio communications, frequencies, modulation the device might be using, identify wireless protocols in use",
|
36
|
+
"tools": "HackRF, LimeSDR, BladeRF, Universal Radio Hacker (URH), other various rf sniffers",
|
37
|
+
"type": "checklist",
|
38
|
+
"items": [
|
39
|
+
{
|
40
|
+
"key": "bluetooth_ble",
|
41
|
+
"title": "Bluetooth and BLE",
|
42
|
+
"caption": "",
|
43
|
+
"description": "Try to sniff the communication, check if it's encrypted, can it be decrypted, are replay attacks possible, check if sensitive information being transmitted in plaintext",
|
44
|
+
"tools": "Flipper, Ubertooth, Nordic nRF, Wireshark (might need to install an additional plugin and/or connect external hardware), btmon (linux), Bluetooth Virtual Sniffer (Windows)"
|
45
|
+
},
|
46
|
+
{
|
47
|
+
"key": "zigbee_lora",
|
48
|
+
"title": "ZigBee and LoRa",
|
49
|
+
"caption": "",
|
50
|
+
"description": "For ZigBee and LoRa devices, try to sniff the communication, capture the encryption key exchange (during active recon see if it's hardcoded on the device), check if the communication can be decrypted, and determine if replay attacks are possible. For LoRa, also check for LoRaWAN-specific vulnerabilities, such as weak join procedures, unencrypted payloads, and improper key management.",
|
51
|
+
"tools": "Nordic nRF, Wireshark (might need to install an additional plugin and/or connect external hardware), ZT-CHK, TI SmartRF Protocol Packet Sniffer (SPPS) software, Semtech LoRaWAN sniffer, TTN Packet Forwarder, SDR tools supporting LoRa (HackRF, LimeSDR, BladeRF), Universal Radio Hacker (URH)"
|
52
|
+
},
|
53
|
+
{
|
54
|
+
"key": "near_field_communication",
|
55
|
+
"title": "NFC Testing",
|
56
|
+
"caption": "",
|
57
|
+
"description": "For card readers like access control locks and credit cards, can also be used in mobile testing. Try to read the information on the card, is it encrypted, can it be decrypted, can you forge a request, does the reader allow you to write to it so it will accept forged messages",
|
58
|
+
"tools": "Flipper (base model is limited, additional hardware can be installed), Proxmark"
|
59
|
+
}
|
60
|
+
]
|
61
|
+
}
|
62
|
+
]
|
63
|
+
},
|
64
|
+
{
|
65
|
+
"key": "active_recon",
|
66
|
+
"title": "Active Recon - Opening up the Device Under Test",
|
67
|
+
"description": "Open up the device to identify the various components and find data sheets online for the various components, map out PCB, find open ports (UART, JTAG). Use tools like screwdrivers, anti-tamper bits, prying tools, soldering iron, desoldering workstation, multimeter, XRAY, probes, oscilloscope, magnifying glass, and logic analyzer.",
|
68
|
+
"type": "checklist",
|
69
|
+
"items": [
|
70
|
+
{
|
71
|
+
"key": "visual_component_identification",
|
72
|
+
"title": "Visual Component Identification",
|
73
|
+
"caption": "",
|
74
|
+
"description": "Using a magnifying glass identify the various components on the PCB in the device, determine what they do and how they connect together, look up datasheets for important components online and read through them",
|
75
|
+
"tools": "magnifying glass, Search Engines"
|
76
|
+
},
|
77
|
+
{
|
78
|
+
"key": "measure_voltage_resistance_continuity",
|
79
|
+
"title": "Measuring Voltage, Resistance, and Continuity",
|
80
|
+
"caption": "",
|
81
|
+
"description": "Using a multimeter identify GND, Vcc, N/C, Pull-Up resistors to help map out the board, verify the different pins identified in the datasheets, and enumerate debug ports",
|
82
|
+
"tools": "multimeter"
|
83
|
+
},
|
84
|
+
{
|
85
|
+
"key": "id_debug_ports",
|
86
|
+
"title": "ID Debug Ports",
|
87
|
+
"caption": "",
|
88
|
+
"description": "Determine which debug protocols are being used, UART, JTAG, SPI, I2C, SWD, and/or NAND/MMC and find out which pins can be used to access those ports. In some cases you may need to desolder the ports and solder header pins to them to access them",
|
89
|
+
"tools": "multimeter, logic analyzer, oscilloscope, soldering iron"
|
90
|
+
}
|
91
|
+
]
|
92
|
+
},
|
93
|
+
{
|
94
|
+
"key": "firmware",
|
95
|
+
"title": "Accessing and Analysing Firmware",
|
96
|
+
"description": "Using info gathered during active and passive recon access and reverse engineer the firmware for the device.",
|
97
|
+
"type": "checklist",
|
98
|
+
"items": [
|
99
|
+
{
|
100
|
+
"key": "dump_download_firmware",
|
101
|
+
"title": "Dump or Download Firmware for Analysis",
|
102
|
+
"caption": "",
|
103
|
+
"description": "Using the identified debug ports try to dump the firmware from the device for reverse engineering. Desoldering the SPI flash and using a tool to dump the firmware from it directly. Try downloading the firmware from the vendor site, however it might be encrypted.",
|
104
|
+
"tools": "desoldering station, JTAGulator, Minicom, PuTTy, Bus Pirate, Raspberry Pi Pico"
|
105
|
+
},
|
106
|
+
{
|
107
|
+
"key":"firmware_analysis",
|
108
|
+
"title":"Firmware Analysis",
|
109
|
+
"caption": "",
|
110
|
+
"description":"Reverse engineering the dumped firmware. Identify encryption if used and try to decrypt it. Use emulation software to help analyze it. Analyze and search the firmware for hardcoded passwords/keys and other sensitive information.",
|
111
|
+
"tools":"binwalk, QEMU, Ghidra, grep, strings, hexdump, readelf"
|
112
|
+
}
|
113
|
+
]
|
114
|
+
},
|
115
|
+
{
|
116
|
+
"key":"testing_device",
|
117
|
+
"title":"Testing the Device",
|
118
|
+
"description":"Using all of the information gathered start testing the device for security vulnerabilities.",
|
119
|
+
"type":"checklist",
|
120
|
+
"items": [
|
121
|
+
{
|
122
|
+
"key":"replay_attacks",
|
123
|
+
"title":"Replay Attacks",
|
124
|
+
"caption": "",
|
125
|
+
"description":"Using the sniffed traffic, determine if replay attacks are possible. Check if the device accepts modified requests and if you can make changes to the configuration. Verify if the device uses unencrypted communication.",
|
126
|
+
"tools":"Wireshark, HackRF, python"
|
127
|
+
},
|
128
|
+
{
|
129
|
+
"key":"shared_resources",
|
130
|
+
"title":"Improper Isolation of Shared Resources",
|
131
|
+
"caption": "",
|
132
|
+
"description":"A SOC may use pin multiplexing allowing an untrusted agent to access assets/info intended to trusted agents only",
|
133
|
+
"CWE": ["CWE-1189"]
|
134
|
+
},
|
135
|
+
{
|
136
|
+
"key":"bac_on_chip_debugger",
|
137
|
+
"title":"Broken Access Control for On-Chip Debugger",
|
138
|
+
"caption": "",
|
139
|
+
"description":"Unauthenticated access to the on chip debugger through the JTAG, allowing root access or access to sensitive information. Or not implementing proper access control during different boot stages.",
|
140
|
+
"CWE": ["CWE-1191", "CWE-1244"],
|
141
|
+
"tools":"JTAGulator, SOIC-8 clip"
|
142
|
+
},
|
143
|
+
{
|
144
|
+
"key":"improper_lock_bit_protection",
|
145
|
+
"title":"Improper Lock Bit Protection",
|
146
|
+
"caption": "",
|
147
|
+
"description":"Assess the integrated circuit trusted lock bit to see if it's missing or can be modified by software later giving access to protected registers, address regions, systems and features that should be protected.",
|
148
|
+
"CWE": ["CWE-1231", "CWE-1233"]
|
149
|
+
},
|
150
|
+
{
|
151
|
+
"key":"cryptographic_implementation",
|
152
|
+
"title":"Cryptographic Implementation",
|
153
|
+
"caption": "",
|
154
|
+
"description":"Assess if the cryptographic algorithm in use is non-standard or a disallowed/non-compliant version.",
|
155
|
+
"CWE": ["CWE-1240"]
|
156
|
+
},
|
157
|
+
{
|
158
|
+
"key": "fault_injection_and_side_channel_attacks",
|
159
|
+
"title": "Fault Injection and Side Channel Attacks",
|
160
|
+
"caption": "",
|
161
|
+
"description": "Test for fault injection and side channel attacks that can bypass security measures to dump firmware, access sensitive information, perform code execution, skip authentication, or escalate privileges.",
|
162
|
+
"CWE": ["CWE-1256", "CWE-1300"],
|
163
|
+
"tools": "chipwhisperer, oscilloscope, pcb workstation with nano probes"
|
164
|
+
},
|
165
|
+
{
|
166
|
+
"key":"memory_overlap",
|
167
|
+
"title":"Improper Handling of Memory Overlap",
|
168
|
+
"caption": "",
|
169
|
+
"description":"Assess if isolated memory regions and access control policies allow software with low privileges to make changes to overlapping memory also used by software running with higher privileges.",
|
170
|
+
"CWE": ["CWE-1260"]
|
171
|
+
},
|
172
|
+
{
|
173
|
+
"key":"clearing_memory_during_state_transition",
|
174
|
+
"title":"Sensitive Information Uncleared Before State Transition",
|
175
|
+
"caption": "",
|
176
|
+
"description":"Assess if sensitive information only needed for one state is cleared after transitioning to the next state, such as during boot or waking up from sleep mode.",
|
177
|
+
"CWE": ["CWE-1272"]
|
178
|
+
},
|
179
|
+
{
|
180
|
+
"key":"volatile_memory_boot_code",
|
181
|
+
"title":"Improper Access Control for Volatile Memory for Boot Code",
|
182
|
+
"caption": "",
|
183
|
+
"description":"Assess if the secure boot process can be bypassed to execute untrusted malicious boot code",
|
184
|
+
"CWE": ["CWE-1274"]
|
185
|
+
},
|
186
|
+
{
|
187
|
+
"key":"firmware_not_updating",
|
188
|
+
"title":"Firmware Not Getting Updates",
|
189
|
+
"caption": "",
|
190
|
+
"description":"Verify if the firmware can receive regular updates as vulnerabilities are discovered in the future.",
|
191
|
+
"CWE": ["CWE-1277"]
|
192
|
+
},
|
193
|
+
{
|
194
|
+
"key":"root_shell",
|
195
|
+
"title":"Root Shell Access",
|
196
|
+
"caption": "",
|
197
|
+
"description":"Try to gain root shell access on the device using an enabled communication protocol, i.e. telnet or ssh, or using an open debug port to interrupt the boot process.",
|
198
|
+
"tools":"SOIC-8 clip, Burp, Caido, GNU Screen"
|
199
|
+
}
|
200
|
+
]
|
201
|
+
},
|
202
|
+
{
|
203
|
+
"key": "upload_logs",
|
204
|
+
"title": "Upload logs",
|
205
|
+
"description": "This should include all associated traffic associated to the in-scope targets.",
|
206
|
+
"type": "large_upload"
|
207
|
+
},
|
208
|
+
{
|
209
|
+
"key": "executive_summary",
|
210
|
+
"title": "Executive summary",
|
211
|
+
"description": "The executive summary should be written with a high-level view of both risk and business impact. It should be concise and clear, therefore it is important to use plain English. This ensures that non-technical readers can gain insight into security concerns outlined in your report.",
|
212
|
+
"type": "executive_summary"
|
213
|
+
}
|
214
|
+
]
|
215
|
+
}
|
216
|
+
}
|
metadata
CHANGED
@@ -1,17 +1,17 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: bmt
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.8.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Federico Tagliabue
|
8
8
|
- Andy White
|
9
|
-
autorequire:
|
9
|
+
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2025-
|
12
|
+
date: 2025-09-10 00:00:00.000000000 Z
|
13
13
|
dependencies: []
|
14
|
-
description:
|
14
|
+
description:
|
15
15
|
email:
|
16
16
|
- federico.tagliabue@bugcrowd.com
|
17
17
|
- arcwhite@arcwhite.org
|
@@ -30,6 +30,7 @@ files:
|
|
30
30
|
- lib/data/0.1/methodologies/ai_llm.json
|
31
31
|
- lib/data/0.1/methodologies/api_testing.json
|
32
32
|
- lib/data/0.1/methodologies/binaries.json
|
33
|
+
- lib/data/0.1/methodologies/hardware_testing.json
|
33
34
|
- lib/data/0.1/methodologies/internal_network.json
|
34
35
|
- lib/data/0.1/methodologies/mobile_android.json
|
35
36
|
- lib/data/0.1/methodologies/mobile_ios.json
|
@@ -46,7 +47,7 @@ metadata:
|
|
46
47
|
source_code_uri: https://github.com/bugcrowd/bmt-ruby
|
47
48
|
bug_tracker_uri: https://github.com/bugcrowd/bmt-ruby/issues
|
48
49
|
rubygems_mfa_required: 'true'
|
49
|
-
post_install_message:
|
50
|
+
post_install_message:
|
50
51
|
rdoc_options: []
|
51
52
|
require_paths:
|
52
53
|
- lib
|
@@ -61,8 +62,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
61
62
|
- !ruby/object:Gem::Version
|
62
63
|
version: '0'
|
63
64
|
requirements: []
|
64
|
-
rubygems_version: 3.
|
65
|
-
signing_key:
|
65
|
+
rubygems_version: 3.0.3.1
|
66
|
+
signing_key:
|
66
67
|
specification_version: 4
|
67
68
|
summary: Ruby wrapper for Bugcrowd's Methodology Taxonomy
|
68
69
|
test_files: []
|