So as requested by you all, here is a breakdown of an interesting bug bounty procedure. Lets Hit 500 likes ASAP :) Follow me on instagram to have a chit chat :)
@@cryptoknight01 🙏 what if someone use it proper way, I know it bors you but being a hacker I want some suggestions on these topic ,I don't want to be Kevin mitnick I want to know the potential expansion of cryptography & cybersecurity .that's it
Waah bhai kya explanation tha..😀 kabhi socha nahi tha ki cybersecurity se related koi topic itne asaani se samjh ayega..You have earned a subscriber..😀✌️
Just came across your channel, watched almost all of the videos liked them as well and found it informative regarding cyber security. I am network engineer and want to start my career in cyber security so request you to please make a detailed video for the same.
Little knowledge is dangerous. With that, my question may stand wrong, but still, out of curiosity, I am asking this. As you mentioned that we can manipulate the request sent to the Apple authorization server and can change the email ID. But before passing the access token, would the authorization server will not ask for the password to correctly authenticate the request?
bhaiya it is your channel for which i was searching till date because i wanted a person like you who share same interest like me , even i have a lot interest in cyber security and vlogs and i came to know about you from gaurav taneja bhai's vlog there was a suggestion for you vlog and from that day till today i have watched all you vlogs , bhaiya you are doing a great job lots of love💖💖 and best wishes for you success...!!
bhai isse pehle ek aur ne app store pe bug found kiya but forgien tha same money reward mujhe laga india mai koi aisa bug found kyu nhi karta then this news pop up in hackerone site then i will shoked and amazed
Upload oscp vlog, that will help lots of students like me. And your work is great keep it up 👍🏻👍🏻 no one talks about info sec like you do, thats really appreciable
Congrats bro, even I am also interested in bug bounty. I want to know how it's performed and I'll be very glad if I get your advice. Hence, I hope I'll be getting a positive reply from you.
Please make a video on starting with kali linux and installing everything which is required for getting started with kali please and your videos are amazing...
Hey Hiten👋 I started learning ethical hacking before one month later . And now I m finding the way to practice my skill . So would you please recommend me what to do next . And one more thing I wanna ask You that most of the security experts and all the blog from where I learned they just talk about work on kali Linux so, Is it compulsory to know kali cmd or work on kali or, Okk if I hack using windows .
@CryptoKnight agr hum apple signin button pr click krte the to wo password bhi mngta tha tb jake wo apple k server pr request check hoti the fhir jwt token assign hota tha....pt agr hum uss beech m agr id bdl denge to password to mismatch ho jayga..then the jwt token is not assign....so, how you hit this type of thing..plz explain..!!
Sir aap ethical hacking ka basic knowledge kaa videos banao plz. Mera ethical hacking subject tha Lekin kuch sikh nhi paya lockdown ki wajah se college band hai. AAP kuch basic tutorial upld karo..Aap bohot acha samjate ho.
Which programming language should I learn first & how much knowledge (at least) do I need to acquire of this specific language for cyber security? Tia & best wishes for your channel.
Jackson you need to learn web languages like html, .net, javascript, php etc. You just need to learn basics of all these. No need to go in depth just learn how the background works. And further read some books which will be available on Google for free no need to buy stuffs. Google provides everything free. If you want further information regarding this field you can message me on instagram. I am kind of Intermediate in cyber security now. 😊
Few of the technical terminology whatever u used that's correct but in terms of jwt used base64 to hold header, body, signatures, that's not correct bcz jwt used HS256 algorithm they're using internally and based 64 used to provide to description or incription user credentials name and password .
Sir your videos are really amazing and interesting ❤. Sir I am a 12wlv class student ...I want make my carrer computer Cyber security fildes, So sir what degree or deploma best for me after 12wlv ?
I got a bug on google Ssrf to xss working well, But the server is sandboxed. If i put document.domain but it showing usercontent through alert but not the injected domain. Anyway to get bounty from there?
starting dekh k laga ni tha video me itna sai content niklega..... nice video bas intro thoda better ho to badiya.... btw what is the price of your book
Hi Buddy Ajay here, could you please tell from where I can read daily blogs related to Cybersecurity. Please provide some links related to that. You are doing great buddy.
Let's I have a PC. While taking oscp exam what if power goes out ?will the exam still be continued or need reschedule or should we prefer laptop or PC?
Nethunter is for android devices. It is like android. You can't install kali on mobile that's why there is nethuntter and it is like android but based on kali linux. Furthermore, difference between kali and termux is that kali is totally a whole operating system just like windows it is directly installes on machine as we use windows pc same we can use it as operating system but termux is just an app which is like terminal in linux operating systems. Think of termux is like remote control car which is a toy and kali is like original car.
So as requested by you all, here is a breakdown of an interesting bug bounty procedure.
Lets Hit 500 likes ASAP :)
Follow me on instagram to have a chit chat :)
Want to say anything about quantum cryptography ?
Havent researched on it much
SIR please make videos on OSCP Certification
@@cryptoknight01 🙏 what if someone use it proper way, I know it bors you but being a hacker I want some suggestions on these topic ,I don't want to be Kevin mitnick I want to know the potential expansion of cryptography & cybersecurity .that's it
Bhai oscp kaise clear kare iske bare me bhi batana us video pe
Normal people-
Stay Home Stay Safe
Cybersecurity people-
Stay Encrypted Stay Secured 😝😂
Actually topic starts from 2:20
Viewers need this type of people
Thank u
The friendly way of talking like we are talking to a friend that's fantastic
Waah bhai kya explanation tha..😀 kabhi socha nahi tha ki cybersecurity se related koi topic itne asaani se samjh ayega..You have earned a subscriber..😀✌️
Bhai Appki Har Video Bahut Mast Hoti Hain or Cyber Security related videos bnate rho we are with you and stay making videos like this
Great. Waiting for your oscp journey video
You are too good men, basically the explanations are joss,
Love from BD
Sir pls make a full BugBounty tut.. your explanation is better than others ❤️❤️
Waiting For Oscp Journey Nor Vlog😘love Both with full entartainment
Eagerly Waiting for Ur new Video🤘
Your best I like you man keep doing you are best
amazing, this could be probably one of the biggest information that i have ever been given..we need such playlist more and more in upcoming days.
Kaise ho bhaiyon n "unki" Behno... Bro i like this line too much😂😂💕❤
😂😂😂
Pls increase your Like expectations......All the best bro .... 👍🏻
Bro, this is unbelievable but it's real. I can't imagine what else can be done
Simply explained... Great....
Sir please make a full course of bug bounty hunting.
And eagerly waiting of yr oscp video
Well Explained! Thanks Bro💟
SIR Ab aap ek thodi advance level ki bhi book bana dijiye purani wali kaafi knowledgeable thi
Congratulations on 4k... Waiting for your next vlog...
Yup hopefully soon 😊
I liked your explanation dude... Just subscribed to your channel... Good luck and way to go 💪
Just came across your channel, watched almost all of the videos liked them as well and found it informative regarding cyber security. I am network engineer and want to start my career in cyber security so request you to please make a detailed video for the same.
I have already made. Please check out - "how to start cyber security career in india"
Amazing video tha bhai 💐💐
Please aap hack the box se machine pe testing krna details k saath bataiye 🙏🙏🙏
Dude thanks for making this video....but get straight to the point man.
First 2 minutes of your video is waste of everyones time
Bro. Gsjb line yaar , kaise ho bhaiyon or "unki" bahno , 💞dil ko chu gyi yaar ye line
Hello, please make a detailed video on how one begineer can approach bug bountty from very 0 level.
Bro witch laptop should we buy for learning Hacking/ cyber security. Mac OR windows
like thok diye sir ab bas video dekhna baaki hai
🔥ye baat
😍😍Love you bro, 1st view, 1st comment and 1st like, need more content like this videos.
🙂🔥
Little knowledge is dangerous. With that, my question may stand wrong, but still, out of curiosity, I am asking this. As you mentioned that we can manipulate the request sent to the Apple authorization server and can change the email ID. But before passing the access token, would the authorization server will not ask for the password to correctly authenticate the request?
Congratulations bhaiya for 4k
Thank you 🙂
bhaiya it is your channel for which i was searching till date because i wanted a person like you who share same interest like me , even i have a lot interest in cyber security and vlogs and i came to know about you from gaurav taneja bhai's vlog there was a suggestion for you vlog and from that day till today i have watched all you vlogs , bhaiya you are doing a great job
lots of love💖💖 and best wishes for you success...!!
Thank you bro 🔥
They should set password so that anyone would not take someone's email or account 😅😅😅😂
Wow bhaiya gr8 hai 👏 like yr videos
You are amazing
bhai isse pehle ek aur ne app store pe bug found kiya but forgien tha same money reward
mujhe laga india mai koi aisa bug found kyu nhi karta then this news pop up in hackerone site then i will shoked and amazed
Bro please start the ethical hacking course step by step for beginners..
Awesome explained i need some help can u suggest me which branch is best IT or CS
Upload oscp vlog, that will help lots of students like me. And your work is great keep it up 👍🏻👍🏻 no one talks about info sec like you do, thats really appreciable
Congrats bro, even I am also interested in bug bounty. I want to know how it's performed and I'll be very glad if I get your advice. Hence, I hope I'll be getting a positive reply from you.
Please make a video on starting with kali linux and installing everything which is required for getting started with kali please and your videos are amazing...
Hey Hiten👋 I started learning ethical hacking before one month later . And now I m finding the way to practice my skill .
So would you please recommend me what to do next .
And one more thing I wanna ask You that most of the security experts and all the blog from where I learned they just talk about work on kali Linux so, Is it compulsory to know kali cmd or work on kali or,
Okk if I hack using windows .
loved the way you explained
Thanks mate 🔥
The Herane Vlogs watched your video after long time because of lockdown i was in my village now i will watch all your videos which i missed
Bro laptop suggest karo for cyber security for biggners
Bro superb imformation, congrats for a new subscribe.
Waiting for your next video ...
Broo.. 500 likes nahi 5000+ likes mile hai.. nice.. good content.. and all the best! 👍
Congratulations for 5.5k bro❤️❤️❤️❤️❤️
Seeing thumbnail I thought you got that bug bounty 😅
🤣😆
Me too😂😂
@CryptoKnight agr hum apple signin button pr click krte the to wo password bhi mngta tha tb jake wo apple k server pr request check hoti the fhir jwt token assign hota tha....pt agr hum uss beech m agr id bdl denge to password to mismatch ho jayga..then the jwt token is not assign....so, how you hit this type of thing..plz explain..!!
Bro which laptop is good for hacking....
Bro you become my role model
The bug is very basic for companies like Apple
Bhai koi best laptop batao jo hacking or programming me best ho or processor konsa sahi h ryzen 5 3500u or i5 8gen ??
bhai aaj hi maine aap ke vlogs dekhne start kare and is just amazing i mean i am stick to your channel best!!!
🙂
Oscp ki basic online class start Karo bro....we love to join
Made me subscribe ur channel after seeing about 2-3videos😍
Basic level laptop under 60k for cyber security..
great bro love from nepal
Sir please make videos on Top Certification
Bhaia proper Vlog kab ayenge😜
Jab vlog layak content hogga. Abhi toh nahi hai so dont want to make it zabardasti ✌🏻
Your explanation was fantastic.👍
OSCP pe detailed video banao...vlog ye sab k liye alag channel banalo ..
Make a video of bud bounty steps or the noob to pro sort of roadmoap waiting fot it
*Bug Bounty
Sir aap ethical hacking ka basic knowledge kaa videos banao plz. Mera ethical hacking subject tha Lekin kuch sikh nhi paya lockdown ki wajah se college band hai. AAP kuch basic tutorial upld karo..Aap bohot acha samjate ho.
I have covered all basic to medium level concepts in my book. 🙂
Which programming language should I learn first & how much knowledge (at least) do I need to acquire of this specific language for cyber security?
Tia & best wishes for your channel.
Jackson you need to learn web languages like html, .net, javascript, php etc. You just need to learn basics of all these. No need to go in depth just learn how the background works. And further read some books which will be available on Google for free no need to buy stuffs. Google provides everything free. If you want further information regarding this field you can message me on instagram. I am kind of Intermediate in cyber security now. 😊
Great explanation 👍👌😀
Few of the technical terminology whatever u used that's correct but in terms of jwt used base64 to hold header, body, signatures, that's not correct bcz jwt used HS256 algorithm they're using internally and based 64 used to provide to description or incription user credentials name and password .
Bro I am one of your new subscriber and wondering if you could do your videos on English because not everyone can follow Hindi.Thanks
Waiting for next video brother jaldi dalo bs
You are explaining good so plz make a video on ethical hacking tutorial
Bro shi h ki nhi....
bro mst h ...
Awsome broo...waiting for oscp vidoe !
Thank you bro nice Explanation
Sir your videos are really amazing and interesting ❤. Sir I am a 12wlv class student ...I want make my carrer computer Cyber security fildes, So sir what degree or deploma best for me after 12wlv ?
Hey Herane,
Bro you are an inspiration. And thank you so much for explaining this in such a simple manner.
My thousand likes for your channel!
I got a bug on google
Ssrf to xss working well,
But the server is sandboxed.
If i put document.domain but it showing usercontent through alert but not the injected domain.
Anyway to get bounty from there?
Bro plz make a detailed video on oscp ..
Ur hairs looks like Mumbaikar nikhil's hair bro
starting dekh k laga ni tha video me itna sai content niklega..... nice video bas intro thoda better ho to badiya....
btw what is the price of your book
250 hai bro more info in description box
Bhai apna hacking course lao ge kya???
Request hai please leke aana
I will enroll for sure 😄😄😄😊
if i want to be an ethical hacker, from what should i start? for example; books, courses and other practical accessories?
Hi Buddy Ajay here, could you please tell from where I can read daily blogs related to Cybersecurity. Please provide some links related to that. You are doing great buddy.
Vickie li has some good web security blogs. Search for it
Medium blogs
Penetration testing k liye kon kon si programming language aani chahiye ?
start at 2:30.
bro , Whats about PTS or eJPT, Is it worth, what to do after PTS
Lovely bro! 🔥🔥 Btw target thoda zyada rakha kro, esi video bnaoge to 500 likes km pad jayega.. 💙
Where can I get ur book ??
Let's I have a PC. While taking oscp exam what if power goes out ?will the exam still be continued or need reschedule or should we prefer laptop or PC?
2021 me se hai koi I whached this video in 3 sep
New subscriber , enjoying yr content
congrach for 4k
Great Summary
🤟🏻
Bro how hard is it to find 10 bugs on some hackerone bounty programs???....if I have just learnt about ethical hacking and bug bounty??
Bhai which Lappy is best for ethical hacking
bro plz answer...In open bug bounty program can i report vulnerability of unregistered domain ..?
Bro Apple nay is bug ko fix kaise kiya hoga, do you have any idea ? plz share.
Wait for oscp vlog
Nethunter kya kalilinux jaisa hai ya alag?
And
Termux or kalilinux ka command same e toh hota hain pr different kya hain?
Nethunter is for android devices. It is like android. You can't install kali on mobile that's why there is nethuntter and it is like android but based on kali linux. Furthermore, difference between kali and termux is that kali is totally a whole operating system just like windows it is directly installes on machine as we use windows pc same we can use it as operating system but termux is just an app which is like terminal in linux operating systems. Think of termux is like remote control car which is a toy and kali is like original car.