Bug Bounty Course 2024 Updated

Поделиться
HTML-код
  • Опубликовано: 25 янв 2025

Комментарии • 218

  • @HoraceLM
    @HoraceLM 9 месяцев назад +71

    Damn I watched "How to start Bug Bounty 2023" last year, passed my PJWT cert this year, found recently my first bug, but I'm still gonna watch this year edition, always something new to learn!

    • @TCS0
      @TCS0 9 месяцев назад +5

      Hi! Congratulations on your PJWT certification. I have a question to ask you. When you finished "How to start Bug Bounty 2023" last year, what did you do next? Because right now, I'm a bit lost. I don't know where to learn new things and where to practice for free. Hack The Box seems interesting, but it paid. If you can help me, thank you.

    • @Nckstr983
      @Nckstr983 8 месяцев назад +2

      what type of bug?

    • @HoraceLM
      @HoraceLM 8 месяцев назад

      @@Nckstr983 I've found Reflected XSS with ATO

    • @HoraceLM
      @HoraceLM 8 месяцев назад

      @@Nckstr983 Reflected XSS with ATO

    • @elimcfly350
      @elimcfly350 4 месяца назад +1

      Just curious what your first bug was?

  • @husseindhooma5816
    @husseindhooma5816 Год назад +44

    11 hour course and It's free, you are god send sir, thank you so much.

  • @D.sNutssss
    @D.sNutssss Год назад +18

    At 8:03:33 "i:0" works for the access token because the server is comparing the access_token that is in our cookie to a valid one on the server. When it compares the two it uses the "==" operator. This operator behaves differently in PHP, basically our token is stored as a string normally, but if we modify the token in our cookie it to be an integer 0, it will cause the server to compare an integer to a string. PHP is weird in that it automatically tries to convert strings to integers if you ever try to compare the two with the "==" operator. If the string happens to start with a nonnumerical character it'll just convert the string to the integer 0. So 0=0 will evaluate as true and the access_token will be valid.

    • @ajibolabalogun8054
      @ajibolabalogun8054 3 месяца назад

      In addition to this, whenever a string is compared to an integer with the operator "==" in php it checks if the first character is a letter if it is. If so, It ignores the other character and takes the first character as it value to compare. So if the first character is 2 in the alphanumeric string in this case , 2 will be taken as the value and be compared to the number. If there isn't any number at the beginning and the string is compared to a number then php will assume the string is zero in other to compare it with a number.

  • @k_usuan
    @k_usuan Год назад +20

    Awesome contents! Bravo . Been going through your 😢 past courses on your bug bounty for the past couple of days while going via the HTB CPTS . Bravo!

  • @danfay6201
    @danfay6201 7 месяцев назад +15

    Many many thanks for this. This is awesome. I would prefer each chapter as a separate video in a playlist as trying to work along at the same time searching the timeline is a nightmare.

  • @comosaycomosah
    @comosaycomosah Год назад +16

    ive learned alot from the key group of ethical hackers who make content but your full free guides take the cake man! appreciate the time you all put in!

  • @MathemadicaPrinkipia
    @MathemadicaPrinkipia Год назад +12

    Thanks man I usually don't watch this kind of content, but after seeing the length of it I got intrigued and now I'm half an hour in😅

  • @denverzimunya8303
    @denverzimunya8303 Год назад +23

    Thank you for your hard work and quality content that you share with us

  • @cloey_b
    @cloey_b Год назад +10

    OMG, this is a massive course. Thank you so much for all your effort and commitment with our community.💗💓💖

  • @bash-ian
    @bash-ian Год назад +10

    You read my mind man, thanks sir your content can't be matched on youtube, we're really glad that you provide such a quality content. Going to complete in two days anyhow, thanks a lot man : )

  • @Xerver215
    @Xerver215 Год назад +3

    I just got into hacking a few months ago, and your videos have been a massive help to me. I have yet to get into the bug bounty hunting process, but I'm excited to get started!
    Thanks for the impressive guides!

  • @utkbkkg
    @utkbkkg 3 месяца назад +2

    6:03:53 , You should use -T4 or -T5 for slow scan not -T1 or -T2, it would run it even faster and make it obvious that you are scanning through their network.

    • @SchemesAndJobsRajasthan
      @SchemesAndJobsRajasthan 2 месяца назад

      But T4 or T5 can be detected by target's security system.
      I think T0 or T1 is safe.

    • @evlhare
      @evlhare 19 дней назад

      Since you have reached this minute of explanation, is the explanation good and worth watching, and do you have any advice for a lost beginner?

  • @-r3d810
    @-r3d810 5 месяцев назад

    Thanks for your hard work
    for this version, and the 2022 version.

  • @Random-0zz
    @Random-0zz 13 дней назад

    This is truly amazing . Thank you sir for the video

  • @shafiq_ramli
    @shafiq_ramli 5 дней назад

    5:34:52 It's not recommended now to use var to declare a variable in javascript. Use let instead.

  • @dixelinho
    @dixelinho 9 месяцев назад +3

    8:03:28
    0 == "Example string" // true
    In PHP, when you compare a number to a string using the == operator, PHP will attempt to convert the string to a number if possible. If the string does not start with any numeric characters, PHP will convert it to 0.
    So, when you compare 0 == "Example string", PHP converts the string "Example string" to a number, resulting in 0. As both sides of the comparison are now 0, the comparison evaluates to true.
    This behavior is part of PHP's type juggling mechanism, where it tries to make sense of comparisons between different types by converting one or both operands to a compatible type.

  • @Free.Education786
    @Free.Education786 Год назад +115

    Boss, could you please create a comprehensive video series covering advanced topics such as advanced time based blind SQL injection injection, XSS, LFI, RFI, and RCE, including the process of uploading web shells on Apache and IIS web servers in live website scenarios? Traditional platforms like test.vulner, DVWA, bWapp, PortSwigger, etc., fail to address real-world challenges like identifying origin IPs, DNS brute force attacks, reverse IP lookups, WAF/IDS/IPS circumvention, AWS/CDN/Tor, reverse proxies, and CMS security 🤙. Your unique content would be invaluable in educating the bug bounty hunting community about genuine issues and solutions. Thanks in advance for your contributions to the community.

    • @AnonymousYW25
      @AnonymousYW25 Год назад +15

      Boss he is making for beginners not for advance people

    • @jobs2132
      @jobs2132 Год назад +7

      Try Harder

    • @rakanal.2925
      @rakanal.2925 Год назад

      But boss those beginners will need advance topic some day ​@@AnonymousYW25

    • @silentfighter8070
      @silentfighter8070 Год назад +2

      yeah i think there should be a real world example cuz after doing these courses we often face the difficulties that whenever we try to go for bug bounties we have seen that we are far behind to find a decent vulnerability i myself is now trying out burp suite labs to get some professional way of finding bugs i hope to get a better video or place where i can train myself to find decent vulnerabilities

    • @thrillhouse4784
      @thrillhouse4784 Год назад +2

      Boss trying to flex with reverse ip lookup lol

  • @Z0nd4
    @Z0nd4 5 месяцев назад

    OMG 12 hs free. You are awesome man. Thank you very much!

  • @TzMKnight
    @TzMKnight Год назад +7

    Wow i just got about an hour into your other bug bounty course and was loving it. Now time to switch to this course 😂

  • @Itsmynickname88
    @Itsmynickname88 5 месяцев назад

    Being a hacker is like making some hidden ads with Monster energy drink! :))))))))) thanks for this course!

  • @CivicSploits
    @CivicSploits Год назад +3

    ty man gonna watch it throughout the next two weeks or so

  • @p4r4d0xhacks
    @p4r4d0xhacks 9 месяцев назад +1

    Currently on the bash scripting part. Made till this far. I would just say a single word for this course and it is : marvelous

  • @terraflops
    @terraflops Год назад +2

    thank you so much for this! will have to watch it again for full video, after AOC

  • @SSRF43
    @SSRF43 2 месяца назад

    Thank you Ryan John 👏

  • @D4ffy_YT
    @D4ffy_YT 11 месяцев назад +1

    Ryan John is a good man; and thorough.

    • @UGPVlogsLA
      @UGPVlogsLA 11 месяцев назад +1

      Yep, he’s a very very good man! And so say all of us!! 😂

  • @Fractal_reComm
    @Fractal_reComm Год назад +5

    thanks thanks thanks every detail of the update version of the previous version of the 11 hr course was written by hand the lines of code and references basically a lot of incredible stuff was written, I hope you read it because you are helping a lot with my work thanks we will still hunt a bug together I will be active thanks for the content really wtf bro this new version of yours is advanced vision a hug I hope you read it, a hug from a bughunter thanks again golden content

  • @ali-barznji
    @ali-barznji Год назад +3

    Thank you very much this course is the best ❤

  • @tiptop_ramen
    @tiptop_ramen Год назад +3

    2 hours 31 minutes and 4 seconds into this video you realized you were going to info dump about the backspace idor and cut it ......but that info could have been so valuable....... i support the rambles on this journey lol hopefully that'll be me one day

  • @exception4144
    @exception4144 Год назад +2

    Great content... Great to explore for beginners

  • @rtr0spct210
    @rtr0spct210 4 месяца назад

    Thank you for this!

  • @aleksandarkosanovic8207
    @aleksandarkosanovic8207 Год назад +2

    Thank You a lot for all Your effort!

  • @tomharvey3043
    @tomharvey3043 Год назад +2

    Thank you for such a great work 😊

  • @derfas5226
    @derfas5226 Год назад +9

    You are the best

  • @bigbuzzbrawl
    @bigbuzzbrawl Год назад +2

    Thanks for the course!

  • @dixelinho
    @dixelinho 9 месяцев назад +2

    11:09:45
    Condition operators
    ge - greater or equal than
    le - less or equal than

  • @The2011andrey
    @The2011andrey Год назад +2

    shout out to you man, thanks for providing this good content

  • @HexZen-r4h
    @HexZen-r4h 2 месяца назад

    GOAT!!! 🔥🔥🔥

  • @Programmingprogram
    @Programmingprogram Год назад +2

    You are really awesome Man👍

  • @typ0_cratz
    @typ0_cratz 9 месяцев назад

    Wow, not many people share this amount of content for free on youtube! I am subscribing just for that!

  • @AyushSingh-f3w9g
    @AyushSingh-f3w9g Месяц назад

    Sir could you do something to zoom the things you are doing like: Writing Kali Linux commands and showing url?

  • @neilm1454
    @neilm1454 5 месяцев назад +1

    "cat file | grep something" ... could be "grep something file" , the leading cat is a habit i got into too, so i understand, but its just extra typing :)

  • @nehaiftikhar645
    @nehaiftikhar645 Месяц назад

    Awesome 👍

  • @Hckr-ei2xj
    @Hckr-ei2xj Год назад +2

    thanks for all your hard work

  • @fantasm0-
    @fantasm0- Год назад +2

    Really appreciate your content.

  • @abdulsaid2275
    @abdulsaid2275 Год назад +2

    Can i be able to discover bugs in bug bounty programs after i watch this course.?

  • @Alabastr-k8k
    @Alabastr-k8k 11 месяцев назад +1

    really appreciate this course if youre still looking for suggestions would love to see more in depth and advanced videos on JWT hadnt ever really encountered that topic till now and its pretty cool. are these becoming prevalent in the wild?

  • @shahid.aaqeel
    @shahid.aaqeel Год назад +2

    Salute.... Thank you so much

  • @xxx12525
    @xxx12525 Год назад +5

    Does this course cover the basic principles for beginners?

  • @UGPVlogsLA
    @UGPVlogsLA 11 месяцев назад

    Thank You so much for your generosity 🙏❤️

  • @MarcelN1980
    @MarcelN1980 Год назад +4

    MASSIVE, thanks a lot! Will you update your existing Udemy course as well? Or create another one? :) Thanks

  • @sibilike
    @sibilike Год назад

    This is awesome! Thanks man.

  • @GeniusFranklyn
    @GeniusFranklyn 3 месяца назад

    God bless you Boss

  • @chamathviranga619
    @chamathviranga619 10 месяцев назад

    Thank you very much for your great effort!!

  • @jinsaugustine5203
    @jinsaugustine5203 Год назад

    you have that first mentioned nmap tutorial?

  • @iiBarly
    @iiBarly 10 месяцев назад +1

    Should I watch the previous version of the bug bounty or just this one ??

  • @pokemonwalkthroughs688
    @pokemonwalkthroughs688 7 месяцев назад

    How did you achieve that smooth camera movement in this video?

  • @wahibwahibe1798
    @wahibwahibe1798 Год назад +2

    Brother, is this a course for beginners? What will I benefit from when I complete this course?

    • @kungsmechackasher6405
      @kungsmechackasher6405 Год назад

      Knowledge

    • @ryan_phdsec
      @ryan_phdsec  Год назад +1

      This course is designed for someone who doesn't know anything and wants to get started in cybersecurity.

  • @PoisonH3ml0ck
    @PoisonH3ml0ck 5 месяцев назад

    Should I finish this one first before taking your course in Udemy?

  • @mnageh-bo1mm
    @mnageh-bo1mm Год назад +2

    i finished the old one , should i watch this again?

    • @ryan_phdsec
      @ryan_phdsec  Год назад +3

      I wouldn't. Just check out the section on API's that will probably be the most benefit from this course vs the old one.

  • @MugiwaraLuffy11
    @MugiwaraLuffy11 Год назад +3

    Is it a nice video for begginers who know how to do basic things with linux ?

    • @ryan_phdsec
      @ryan_phdsec  Год назад +3

      This course is designed for someone who doesn't know anything and wants to get started in cybersecurity.

    • @neoreign
      @neoreign Год назад

      @@ryan_phdsec damn! exactly what I need.

  • @yusufabubakar1194
    @yusufabubakar1194 Год назад +2

    Thank you so much❤

  • @orbitxyz7867
    @orbitxyz7867 Год назад +5

    Thank you sir ❤

  • @shahriar0x013
    @shahriar0x013 Год назад +1

    Can we get those slides?

  • @kevinblanco490
    @kevinblanco490 Год назад +3

    between your udemy course and this one, which one should I do first or if someone could give me some guidance?

  • @aminemerad2718
    @aminemerad2718 Год назад +1

    Can i start with this course ? am a beginner in the field , I’ve studied ccna and have some security basics, thank you for the answer

    • @unknownboi9084
      @unknownboi9084 Год назад +1

      yes you can. even the explaination given by this man is easy to under stand and awesome so you should go for it.

  • @kolawoleoyedokun7250
    @kolawoleoyedokun7250 9 месяцев назад +1

    Please I want to download your Udemy bug bounty. But it isn’t updated over there, what do I do, or can you please update it?

  • @IntroMakerNET
    @IntroMakerNET Год назад

    What about Prototype Pollution?

  • @arnabdas9323
    @arnabdas9323 6 месяцев назад

    While I am using postbox after forwarding and signup it is not showing anything

  • @3DBlendMix
    @3DBlendMix 3 месяца назад

    Amazing content

  • @MFoster392
    @MFoster392 Год назад +1

    Great video

  • @babaibir
    @babaibir 11 месяцев назад

    Bro you saved us really time and money thnx man.

  • @sabbirbasar6371
    @sabbirbasar6371 8 месяцев назад

    thank you in my bottom of my heart

  • @killany27
    @killany27 Год назад

    This is GOLD 🤯❤

  • @senorsleepy2359
    @senorsleepy2359 10 месяцев назад

    Do you have a bug bounty pathway you recommend?

  • @ghostbyte404
    @ghostbyte404 9 месяцев назад

    hi i was following you video and i have a question is it better to use nmap or another tool call rustscan thanks love the video i learnt a lot 😄😄😄😄😄

  • @GeniusFranklyn
    @GeniusFranklyn 3 месяца назад

    Man you legend...

  • @viv1622
    @viv1622 Год назад +1

    Hello. Thanks for the video! I have bought and am about to start your Complete Ethical Hacking Course | Bug Bounty on Udemy. Would you recommend this or the one on Udemy considering this is recently updated? Thank you

  • @safetime100
    @safetime100 9 месяцев назад

    Legend ❤ thanks

  • @Lucius_21
    @Lucius_21 Год назад

    hi, when I typed " shodan host (ip address)", it said "403 forbidden". Could you help me on this?

  • @imran_hossain123
    @imran_hossain123 Год назад +1

    want more content on jwt

  • @m4a1mag
    @m4a1mag 7 месяцев назад

    hey currently at the jucie shop part, is it okay that I do all of these challenges on my normal desktop(windows) not a virtual machine ?

  • @majidabri8125
    @majidabri8125 11 месяцев назад

    thanks sir🙏

  • @jubaaissaoui5496
    @jubaaissaoui5496 Год назад +1

    Bro I love you

  • @alquranchannel2337
    @alquranchannel2337 Год назад +3

    Legend ❤

  • @Shard.xo.
    @Shard.xo. 11 месяцев назад

    Sorry if this is a dumb question but by the end of this course will it be enough to prepare somebody with no prior cybersecurity knowledge to catch their first bug? Thanks and love your channel btw u earned a new sub!❤

  • @Nick-vd7cg
    @Nick-vd7cg 8 месяцев назад

    at 1:07:11 it shows only sub-domains in the results here, but when i do the exact same line of code with the same flags i get lots and lots of different stuff in it too.
    like MX and NS servers, ip's, mac adresses , and like a 100 lines of results. There's no way i can copy/paste all of those easily by how it prints.
    Why is my output different?
    Anyone please help!

    • @Nick-vd7cg
      @Nick-vd7cg 8 месяцев назад

      oh its an older version on display, i wonder how i would go about on the latest version

  • @dmanm85
    @dmanm85 24 дня назад

    I would call this more like a demonstration rather than a course. There is a lot of good info, but a lot of it is not laid out in a very comprehensive method. For example, in the LFI section he talks about the process leading to directory traversal, but never explains what that is.

    • @d6coy
      @d6coy 15 дней назад

      Do you recommend or know more advanced resource?

  • @phamcongtoan1399
    @phamcongtoan1399 Год назад +1

    I want to start in the field of cybersecurity, how to follow the roadmap, please answer me,thanks !

  • @tasfarsowad7612
    @tasfarsowad7612 Год назад +1

    I am a Newbie. Is this a beginner friendly course? I mean what things should i know before jumping into this course?
    Btw, thanks for the course 🖤

  • @sapsap02
    @sapsap02 Год назад +1

    hey i would love to know if i should follow this course only or take the one from tcm security

    • @ryan_phdsec
      @ryan_phdsec  Год назад +1

      If you want to be a penetration tester do TCM.

  • @avm263
    @avm263 9 месяцев назад

    Thank you very very much!

  • @serychristianrenaud
    @serychristianrenaud Год назад

    Thanks

  • @mahdihasan42
    @mahdihasan42 11 месяцев назад

    need some videos on splunk

  • @jayvapor150
    @jayvapor150 8 месяцев назад

    Where would I find tutorials from a newbie perspective in a form of baby steps?

    • @TheRealBoo2Fried
      @TheRealBoo2Fried 3 месяца назад

      in my opinion this is baby steps man, whatever you don't understand just look it up, google will provide all the information you need. I watch and will rewatch until I understand every aspect of what I am learning. Knowledge is everything !!!

  • @muhammadadnan1430
    @muhammadadnan1430 Год назад

    Amazing video. A request. It's 2024 almost. Can you please make the videos in 4k? Sorry if it sounds rude. :(

  • @tinsayetesfaye2989
    @tinsayetesfaye2989 Год назад

    Tnx sir how to be install burp suite ??

    • @Gray3ther
      @Gray3ther Год назад

      This is excellent content but if it doesn't answer your Burp question, rs0n_live has a recent, thorough video "Everything You Need to Know About Burp Suite." 😁

  • @hexagone_1001
    @hexagone_1001 5 месяцев назад

    is this for learning Bug Bounty Hunting?

  • @tejaspachpile9269
    @tejaspachpile9269 Год назад

    Hi, could you please do live bug bounty on vdp that would be really learning experience for us and we would know how a experience bug bounty hunter start a recon and then proceed further

  • @lujisatv
    @lujisatv Месяц назад

    Now am on 3hours I hope to find my first bug in 2025

  • @Nohope__
    @Nohope__ 11 месяцев назад

    amazing please put proxy config tutorial at the beginning of this video to avoid ip-ban as one follows along.