Easiest Way To Get A Critical Bug And Into A Company's Infrastructure?
HTML-код
- Опубликовано: 4 фев 2024
- 📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
💵 Support the Channel:
You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
☕️ Buy Me Coffee:
www.buymeacoffee.com/nahamsec
JOIN DISCORD:
discordapp.com/invite/ucCz7uh
🆓 🆓 🆓 $200 DigitalOcean Credit:
m.do.co/c/3236319b9d0b
💬 Social Media
- / nahamsec
- / nahamsec
- twitch.com/nahamsec
- / nahamsec1
#bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp
yes please more content of the things you enjoy talking about. Definitely breaking down these kind of process makes it really easy to understand.
Naham sigue con videos profundizando en RECON, SOS el puto AMO, aprendo una banda con tu videos gracias hermano, saludos desde Madariaga!
thank you as always for your content!
Yes really enjoy it .. waiting for great content thanks
Hi sir, great content as always. A quick question. Would a pen testing certification that focus on networks and infra such as the OSCP or PNPT be useful at all for bug bounty programs? I'm asking because I see mostly mobile and web apps in scope? Thank you
Thank you it gave me new way to look our for interesting domains.
As a begineer in this feild i would like to listen more content like this and bit lengthy one alos where you give clear and deep explanation about the topic
cheers always informative!
Yeah this is petty high value. Especially since it replaces the “automated bug hunting” with an intentional starting point.
Definitely interested in other recon ideas you prefer
The best Hunter ❤
thanks man
Waiting for H1-305 vlog.
This is Good. I usually go for eyewitness and then eyeballer on it. And Dorking for any pages with registration
Could you explain what you mean pl, I did not understand
These small hands on walk-throughs are pretty invaluable. Teaching people (1) terminal usage, and (2) another way to go through the massive subs/ends list after all that fuzzing/spidering... it's just really helpful given all the things we need to learn to approaching a big system. Thank you (and more deep dive / hands on usage videos, please)!
wow!!! it's was awesome! thank you @NahamSec
Nice video bro❤❤
More of this type of content please
Love from India ♥️
Great content
Yes please I will like more content like this.
Hey Naham I have a good amount of experience with JS and HTML, I know good amount of python and java a while ago i built a few personal websites as projects but I have always wanted to get into hacking I really see myself falling inline with it. I have watched many of your videos. But I’m still not sure where to start because XSS feels a bit complicated and portswigger says to start with SQLi. What do you recommend?
ok but usually domains with *git*, *dev* or *sonar* are not reacable from internet so how i can access them ? when i scan with nmap i got error
This guy can hack nasa, he is really talented
Good video
#Internal. For a video idea can you go over all the different types of internal assets and potential exposures/leaks ie. Jenkins, Jira, Sonar and others.
Internal 🔥
Amazing
what happended to your finger ?
❤❤❤❤
internal
#Internal
Internal
First comment
LETS GOOO
Bro can you make a series for bug bounty means teach complete bug bounty please its my request❤❤
@@rctech1237 exactly thats what we all need
@@rctech1237no. If you want to learn,get ready to get your hands dirty. No hands hodling!!
@@vz7742why bro ??
Naham sigue con videos profundizando en RECON, SOS el puto AMO, aprendo una banda con tu videos gracias hermano, saludos desde Madariaga!
internal