Case Studies
Case Study 1: Bug Bounty - New Program Launch
Target Profile
Configuration
# Custom config: bounty-rush.cfg
# Fast subdomain enumeration
SUBBRUTE=false # Skip brute-force (time-consuming)
SUBPERMUTE=false # Skip permutations
SUBIAPERMUTE=false
# Essential web checks only
WEBPROBESIMPLE=true
WEBPROBEFULL=false # Skip detailed probing
# Priority vulnerability checks
NUCLEICHECK=true
NUCLEI_SEVERITY="critical,high" # Only high-impact
SUBTAKEOVER=true # Quick wins
# Skip slow modules
FUZZ=false
XSS=false
SQLI=false
SSRF_CHECKS=falseExecution
Results
Finding
Severity
File Location
Key Takeaways
Case Study 2: Security Assessment - Enterprise Client
Target Profile
Pre-Engagement Setup
Configuration
Execution Plan
Results Summary
Category
Count
Files
Deliverable Generation
Key Takeaways
Case Study 3: Red Team - Distributed Scanning with Axiom
Target Profile
Infrastructure Setup
Configuration
Execution
Monitoring Progress
Results
Target
Subdomains
Web Servers
Critical
High
Cost Analysis
Post-Scan Cleanup
Key Takeaways
Case Study 4: Continuous Monitoring - CI/CD Integration
Setup
Configuration
Diff Script
Alert Output
Key Takeaways
Quick Reference: Scenario → Configuration
Scenario
Mode
Key Flags
Config Changes
Last updated