BUG BOUNTY TIPS: FINDING ENDPOINTS | 2023

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024

Комментарии • 26

  • @tks5182
    @tks5182 Год назад +2

    Can you do a full video based on endpoint finding methods not just public ones but more hidden ones please and thank you ❤

  • @Sohailkhan2001
    @Sohailkhan2001 Год назад

    Great video vro....Keep creating such content....

  • @jay-india
    @jay-india Год назад

    very nice video 😍😍😍😍😍😍

  • @dennisreynolds9202
    @dennisreynolds9202 Год назад

    Got a question: udemy would it be a great place to learn bug bounty hunter/ hacking for bug?

  • @gokul5582
    @gokul5582 Год назад +2

    why the parameters looks wiered?

  • @KaafUzair
    @KaafUzair Год назад +1

    Hi brother please make a video about " GAP " tool this tool spotlight nowadays

    • @KaafUzair
      @KaafUzair Год назад +1

      GAP tool is also bur extension

    • @DEADCODE_
      @DEADCODE_ Год назад

      No you don't have to create video for GAP we're already using i

  • @shpockboss3834
    @shpockboss3834 Год назад

    how to prefix url aswell in output??

  • @anonymous_life525
    @anonymous_life525 Год назад

    How can we find whether this js endpoint is venerable or not

  • @panagiotismitkas5526
    @panagiotismitkas5526 Год назад

    This tool can be combined with waymore (another tool from the same hacker) and give you even better attack surface. Have you ever tried it?

  • @EsTeh_Manis2
    @EsTeh_Manis2 Год назад

    Mantap 👍👍

  • @jay-india
    @jay-india Год назад

    bhai hamne subdomain takeover kia hu kuch problem ho raha hai kia aap meri madat karogi

  • @dollaaaar
    @dollaaaar Год назад

    thanks

  • @TonyAsh-rp6fp
    @TonyAsh-rp6fp Год назад

    You did not show what to do after finding these urls. Are you goin to make 2nd part of this ?

  • @darkmix4192
    @darkmix4192 5 месяцев назад

    What can I'll do this endpoint? Anybody tell me? Which attack i perform the endpoint place?

    • @BePracticalTech
      @BePracticalTech  5 месяцев назад +1

      Once you have identified the endpoints, you can look for various attacks like xss, sql injection etc. Many times, these endpoints can lead you to some sensitive information.

    • @darkmix4192
      @darkmix4192 5 месяцев назад

      @@BePracticalTech ohh... thanks brother for your information.

    • @GmRubel-ly9yp
      @GmRubel-ly9yp 2 месяца назад

      How to do XSS or SQL?​@@BePracticalTech

  • @sylncereyes
    @sylncereyes Год назад

    can you provide a way to find bugs from 0 ?

  • @madmax-mb9fw
    @madmax-mb9fw Год назад

    Getting attribute error while installing.please help .

    • @madmax-mb9fw
      @madmax-mb9fw Год назад

      @@BePracticalTech sorry ! can't reply with whole error

    • @madmax-mb9fw
      @madmax-mb9fw Год назад

      It’s coming from python3

  • @dharamveerprasad6749
    @dharamveerprasad6749 Год назад

    bro how you install only terminal in your windows

  • @alhusseinalseelawi979
    @alhusseinalseelawi979 2 месяца назад

    you've clearly done illegal activity right there on that video