Это видео недоступно.
Сожалеем об этом.

How to Write Great Bug Bounty Reports

Поделиться
HTML-код
  • Опубликовано: 2 июл 2023
  • Pentests & Security Consulting: tcm-sec.com
    Get Trained: academy.tcm-se...
    Get Certified: certifications...
    Merch: merch.tcm-sec.com
    Sponsorship Inquiries: info@thecybermentor.com
    📱Social Media📱
    ___________________________________________
    Twitter: / thecybermentor
    Twitch: / thecybermentor
    Instagram: / thecybermentor
    LinkedIn: / heathadams
    TikTok: / thecybermentor
    Discord: / discord
    💸Donate💸
    ___________________________________________
    Like the channel? Please consider supporting me on Patreon:
    / thecybermentor
    Support the stream (one-time): streamlabs.com...
    Hacker Books:
    Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
    The Hacker Playbook 3: amzn.to/34XkIY2
    Hacking: The Art of Exploitation: amzn.to/2VchDyL
    The Web Application Hacker's Handbook: amzn.to/30Fj21S
    Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
    Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
    Linux Basics for Hackers: amzn.to/34WvcXP
    Python Crash Course, 2nd Edition: amzn.to/30gINu0
    Violent Python: amzn.to/2QoGoJn
    Black Hat Python: amzn.to/2V9GpQk
    My Build:
    lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
    darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
    EVGA 2080TI: amzn.to/30d2lj7
    MSI Z390 MotherBoard: amzn.to/30eu5TL
    Intel 9700K: amzn.to/2M7hM2p
    G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
    Razer Nommo Chroma Speakers: amzn.to/30bWjiK
    Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
    CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
    Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
    My Recording Equipment:
    Panasonic G85 4K Camera: amzn.to/2Mk9vsf
    Logitech C922x Pro Webcam: amzn.to/2LIRxAp
    Aston Origin Microphone: amzn.to/2LFtNNE
    Rode VideoMicro: amzn.to/309yLKH
    Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
    Elgato Cam Link 4K: amzn.to/2QlicYx
    Elgate Stream Deck: amzn.to/2OlchA5
    *We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

Комментарии • 20

  • @AlecMaly
    @AlecMaly Год назад +11

    Report writing is a fine art, especially for bug bounty. Report just good enough to get paid, but vague enough that the implemented fix can be bypassed so you can farm the same bug for multiple bounties. 😂

  • @Zen_Monkey
    @Zen_Monkey Год назад +17

    Hope this is being put out since you're working on a Bug Bounty Course!

    • @JoeHellethemayor
      @JoeHellethemayor Год назад +3

      It's because we get a lot of bad bug bounty reports in our VDP program.

    • @Zen_Monkey
      @Zen_Monkey Год назад +1

      @@JoeHellethemayor That was option #2 for me, lol

  • @markfuentes3666
    @markfuentes3666 Год назад +2

    this is exactly what I have been waiting for. Thank you Heath!!!!😀

  • @juliusrowe9374
    @juliusrowe9374 Год назад +1

    Great tutori8al Heath!

  • @melegritojoel
    @melegritojoel Год назад +2

    nice work man ❤❤❤

  • @ForGivennnnn
    @ForGivennnnn Год назад +3

    Nice video, thank you! But when is the best time to start bug bounty hunting?

  • @_FudgeSupreme
    @_FudgeSupreme Год назад +2

    Nice Video Mate
    ❤❤❤

  • @Did_Diggie_Die_Yet
    @Did_Diggie_Die_Yet Год назад +1

    I know nothing about coding or hacking or ANYTHING, but I really want to learn- even just the basics would be cool. Do you know a good starting point or what I should do to set a foundation for building my knowledge on the subject?

  • @maheshsanga8301
    @maheshsanga8301 Год назад +1

    Big fan sir❤

  • @youcef2851
    @youcef2851 Год назад

    thank you heath

  • @mianhussnainjaved7313
    @mianhussnainjaved7313 Год назад +1

    Just asking what if some comments and low severity vulnerabilities able to fetch the database where one can access admin account without changing the password, are those vulnerabilities will stay in low severity or we should set them as critical?

    • @cyberdark8082
      @cyberdark8082 Год назад

      From my point of view, regardless of whether a tool tells you that you have something critical, it would be necessary to see if that asset is critical for the organization as such.
      But going back to what you indicate, I believe that something considered as disclosure of weak credentials or passwords must be approached with the same implication that it deserves. Since it carries an even greater risk.

  • @Ectokin
    @Ectokin Год назад

    What tools do you like to use for note taking / documentation?

  • @mekdadpdiop5764
    @mekdadpdiop5764 Год назад +1

    nice

  • @antonioavilashiraz
    @antonioavilashiraz Год назад

    MMMM. I will start your courses today. I just want to start with your courses. Not proffessor messer etc. just remind me how to start> thank you

  • @SY_KURD
    @SY_KURD Год назад +1

    First

  • @racerx1777
    @racerx1777 Год назад

    Dude! Who are these other people on this channel? Not really liking that