Plumbing The Plumber: A Playbook for Integration Servers
Recon Village @ DEF CON 33 • 8th, 9th and 10th August 2025
Abstract
This will be your field guide for hunting down and finding the complex plumbing of integration servers. From Webmethods, Oracle Integrations and other similar integration servers, we are going to look at ways to find them exposed to the internet and how to identify common misconfigurations through reconnaissance.
Toolkit - Discover methods to identify various integration technologies in the wild, even those trying to stay hidden
Endpoints - learn about forgotten management consoles, exposed API's and how these mostly forgotten plumbing can lead to big wins (bug bounty)
Actionable - Walk away with recon techniques that you can immediately apply for offensive assessments or bolster your defensive posture finding your own organizations hidden infrastructure.
My A-Z approach will cover techniques from dorking, Shodan/Censys queries, HTTP header analysis, and favicon hashing, demonstrating the immense value (both offensive and defensive) of meticulously hunting these hubs. I'll showcase 4-5 distinct methodologies to effectively find these servers.
To aid your hunts, I will also share a custom tool developed for identifying and fingerprinting exposed integration servers."
Speakers
Hacker
Defend Icelands top ranked hacker. Security Architect at Íslandsbanki.
View full speaker profile →Senior Security Consultant - ProCircular
Ryan "Roll4Combat" Bonner is a Senior Security Consultant at ProCircular, an experienced bug bounty hunter, and a teaching assistant with Arcanum Security, where he shares his expertise on offensive security topics including attacking AI, bug hunting methodologies, and recon.
View full speaker profile →
