Easiest Way To Get A Critical Bug And Into A Company's Infrastructure?

Поделиться
HTML-код
  • Опубликовано: 4 фев 2024
  • 📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
    💵 Support the Channel:
    You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
    ☕️ Buy Me Coffee:
    www.buymeacoffee.com/nahamsec
    JOIN DISCORD:
    discordapp.com/invite/ucCz7uh
    🆓 🆓 🆓 $200 DigitalOcean Credit:
    m.do.co/c/3236319b9d0b
    💬 Social Media
    - / nahamsec
    - / nahamsec
    - twitch.com/nahamsec
    - / nahamsec1
    #bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp

Комментарии • 41

  • @constantRic
    @constantRic 4 месяца назад +2

    yes please more content of the things you enjoy talking about. Definitely breaking down these kind of process makes it really easy to understand.

  • @Tartaro_TP
    @Tartaro_TP 4 месяца назад +2

    Naham sigue con videos profundizando en RECON, SOS el puto AMO, aprendo una banda con tu videos gracias hermano, saludos desde Madariaga!

  • @MarkFoudy
    @MarkFoudy 4 месяца назад

    thank you as always for your content!

  • @user-jz8vq7wo5z
    @user-jz8vq7wo5z 4 месяца назад

    Yes really enjoy it .. waiting for great content thanks

  • @CarlosFerreiraOfficial
    @CarlosFerreiraOfficial 2 месяца назад

    Hi sir, great content as always. A quick question. Would a pen testing certification that focus on networks and infra such as the OSCP or PNPT be useful at all for bug bounty programs? I'm asking because I see mostly mobile and web apps in scope? Thank you

  • @lol-hz9mc
    @lol-hz9mc 4 месяца назад

    Thank you it gave me new way to look our for interesting domains.

  • @abhishekjain4883
    @abhishekjain4883 4 месяца назад

    As a begineer in this feild i would like to listen more content like this and bit lengthy one alos where you give clear and deep explanation about the topic

  • @mgillanders
    @mgillanders 4 месяца назад

    cheers always informative!

  • @Casp1anX
    @Casp1anX 4 месяца назад +1

    Yeah this is petty high value. Especially since it replaces the “automated bug hunting” with an intentional starting point.
    Definitely interested in other recon ideas you prefer

  • @Loopbob4
    @Loopbob4 4 месяца назад

    The best Hunter ❤
    thanks man

  • @prakhar0x01
    @prakhar0x01 4 месяца назад +6

    Waiting for H1-305 vlog.

  • @GhtsGameplay
    @GhtsGameplay 4 месяца назад +1

    This is Good. I usually go for eyewitness and then eyeballer on it. And Dorking for any pages with registration

    • @bakeery
      @bakeery 4 месяца назад

      Could you explain what you mean pl, I did not understand

  • @papafhill9126
    @papafhill9126 4 месяца назад +1

    These small hands on walk-throughs are pretty invaluable. Teaching people (1) terminal usage, and (2) another way to go through the massive subs/ends list after all that fuzzing/spidering... it's just really helpful given all the things we need to learn to approaching a big system. Thank you (and more deep dive / hands on usage videos, please)!

  • @Suniil_07
    @Suniil_07 4 месяца назад

    wow!!! it's was awesome! thank you @NahamSec

  • @mysteriousministar2481
    @mysteriousministar2481 4 месяца назад

    Nice video bro❤❤

  • @0xKingSlayer
    @0xKingSlayer 3 месяца назад

    More of this type of content please

  • @PALLAB194
    @PALLAB194 4 месяца назад

    Love from India ♥️

  • @AindriuMacGiollaEoin
    @AindriuMacGiollaEoin 4 месяца назад

    Great content

  • @elkins540
    @elkins540 4 месяца назад

    Yes please I will like more content like this.

  • @sebastianhyjek3427
    @sebastianhyjek3427 4 месяца назад

    Hey Naham I have a good amount of experience with JS and HTML, I know good amount of python and java a while ago i built a few personal websites as projects but I have always wanted to get into hacking I really see myself falling inline with it. I have watched many of your videos. But I’m still not sure where to start because XSS feels a bit complicated and portswigger says to start with SQLi. What do you recommend?

  • @00Jimmy00
    @00Jimmy00 4 месяца назад +1

    ok but usually domains with *git*, *dev* or *sonar* are not reacable from internet so how i can access them ? when i scan with nmap i got error

  • @Indraneel_Ray
    @Indraneel_Ray 3 дня назад

    This guy can hack nasa, he is really talented

  • @amaduscamara4378
    @amaduscamara4378 4 месяца назад

    Good video

  • @user-bn2nv5mx2g
    @user-bn2nv5mx2g 4 месяца назад

    #Internal. For a video idea can you go over all the different types of internal assets and potential exposures/leaks ie. Jenkins, Jira, Sonar and others.

  • @jesseoruma5710
    @jesseoruma5710 4 месяца назад

    Internal 🔥

  • @chhachhiawan
    @chhachhiawan 4 месяца назад

    Amazing

  • @meljithpereira5532
    @meljithpereira5532 4 месяца назад

    what happended to your finger ?

  • @rctech1237
    @rctech1237 4 месяца назад +1

    ❤❤❤❤

  • @hiamealhilwa6684
    @hiamealhilwa6684 3 месяца назад

    internal

  • @lifeofsq5653
    @lifeofsq5653 4 месяца назад

    #Internal

  • @itsm3dud39
    @itsm3dud39 4 месяца назад

    Internal

  • @rctech1237
    @rctech1237 4 месяца назад +6

    First comment

    • @NahamSec
      @NahamSec  4 месяца назад +7

      LETS GOOO

    • @rctech1237
      @rctech1237 4 месяца назад +7

      Bro can you make a series for bug bounty means teach complete bug bounty please its my request❤❤

    • @skyedunphy
      @skyedunphy 4 месяца назад +3

      @@rctech1237 exactly thats what we all need

    • @vz7742
      @vz7742 4 месяца назад

      ​@@rctech1237no. If you want to learn,get ready to get your hands dirty. No hands hodling!!

    • @rctech1237
      @rctech1237 4 месяца назад

      ​@@vz7742why bro ??

  • @Tartaro_TP
    @Tartaro_TP 4 месяца назад

    Naham sigue con videos profundizando en RECON, SOS el puto AMO, aprendo una banda con tu videos gracias hermano, saludos desde Madariaga!

  • @brs2379
    @brs2379 4 месяца назад

    internal