📚 Purchase my course and learn about bug bounty hunting with over 11 hours of content, 100+ labs: bugbounty.nahamsec.training
@kharbandaumang3 жыл бұрын
this is some GOD-LEVEL recon !!! We want more sessions from Tom. Thanks nahamsec for bringing this to the community and thanks Tom for sparing your time for this!!!
@alexander_adnan2 жыл бұрын
Lol .. 😂…GOD level would leave you speechless
@godspeed2124 Жыл бұрын
@@alexander_adnan what god level according to you?
@65hammad Жыл бұрын
@@alexander_adnanyou don't have a clue then. For mass recon, this is GOD-tier automation. These guys can even automate the entire process if they wanted.
@alexander_adnan9 ай бұрын
@@godspeed2124 looks like you will find out before others. Not a good idea to do reverse psychology, with strangers. I would be rational though, there’s no recipe for recon, it depends on your target while Technics matters less than the potential.
@cr4zy_0o3 жыл бұрын
The calmness that Tom have is really unique, great and fancy. + The way he do his things is really epic Really a great guy
@netoeli3 жыл бұрын
fantastic video , Tom really knows his stuff
@IBDLFSEragon5 ай бұрын
Mind blowing. Thank you so much for giving back to community.
@franco21793 жыл бұрын
It's funny because I can tell from Nahamsec's faces that he just loves Tomnomnom. At the same time it makes him laugh that he is so calm when explaining things.
@NahamSec3 жыл бұрын
Haha! Tom is one of the most genuine and nicest people I have had on the show.
@chasejensen883 жыл бұрын
I think he's also realizing the greatness he's capturing at the moment, he isn't fully comprehending it yet but he knows it.
@HenryLawrenceHMBL2 жыл бұрын
I would love to be a Shopify developer watching this unfold
@mateuszwasielewski7193 Жыл бұрын
I started watching this with hope of learning something. Ended with depression and one conclusion - I should stop learning this stuff if I'm gonna need to compete with maaany, maaany people as Tom. And as he said - it was his first attempt since like two years ago. I would need like a week to check all the things that he checked. Now I get it why entry-level positions needs few years of experience but in the same time I don't see a way to get this experience
@purplethunder7789 ай бұрын
If you think that the competitors out there are all as skillful as tom . You are very wrong
@rajanrawal63962 жыл бұрын
amazing, this could be probably one of the biggest information that i have ever been given. we need such playlist more and more in upcoming days. i hope i made you understand the things that i wanted to make you understand.. again, we need such playlist more and more in upcoming days.
@CWLabs72092 жыл бұрын
Every week i rewatch your videos; I am learning new things 💙.
@SankizTime Жыл бұрын
hora
@CWLabs7209 Жыл бұрын
@@SankizTime :D
@hayben70462 жыл бұрын
Thank you both for this great content. We want more videos with @TomNomNom.
@ca79863 жыл бұрын
Tom is really really good! He knows what he is doing! Amazing! Thanks Nahamsec for this video.
@BnayaProgramming3 жыл бұрын
Start at 5:59
@affulsamuel72810 ай бұрын
That is why Hacking is time and patience game. i love the way he spend days to come on this i love this channel
@bertrandfossung12163 жыл бұрын
This is epic!! I've have to watch this video over 10 times just to understand Tomnomnom's recon process. The guy is really really good at what he does. Thanks @nahamsec & @Tomnomnom🙏🏽🙏🏽🙏🏽
@abdul-rahman7608 Жыл бұрын
Tom is a genius I must confess 🖤💯
@piusgabula2 жыл бұрын
This is byfar the most incredible live recon i have watched on youtube
@jeffreynoose2 жыл бұрын
I can watch these 50 times daily I love nomnom
@baolamminh11463 жыл бұрын
I improve my bash skill much when watching this video. thanks Tomnomnom & Nahamsec
@samfisher84262 жыл бұрын
maan seeing how tom is working makes me feel down, this dude is so good
@vonniehudson3 жыл бұрын
“ass, is that a new tool to compete with meg? I don’t know” had me rolling lololz
@crusader_3 жыл бұрын
Could you please upload all the other recons
@ashleypursell97023 жыл бұрын
i was literaly looking for something just like anew to use in my automation since i run scans everday i want to add stuff to already existing txt files. i have seen people use it and idk why i only found out about it rn, great video thanks so much
@joefawcett2191 Жыл бұрын
these vim and bash skills are really something to behold
@The1994mattj7 ай бұрын
Would be interesting to see how different the process/tools look 3 years on.
@thenarrowgate30638 ай бұрын
I wish I had vim mastered in this way, I use nano which has some of the same features but vim has way more flexibility it's a language all it's own and it's why hackers prefer it, I mean true command based hackers..windows has spoiled this generation..nothing wrong with a GUI but hacking is about control and putting that level of control in a GUI is a major resource hog..TOM you are a dying breed, my hats off to you..grey that is
@xrfox16343 жыл бұрын
I love this man!
@amir-or6ufАй бұрын
it was awesome, thanks man.
@theys68373 жыл бұрын
*TomNomNom* is a FKIN G 💯👏
@gifbfbvhvhdhfhfjffjfnfhfb5152 жыл бұрын
best video ive seen in a long time
@danieltamang22893 жыл бұрын
finally, the two underrated hunters!!
@ar-uh1dj3 жыл бұрын
He is truly a Genius!!!!!!!
@ggmaxx663 жыл бұрын
"...previous versions can be a goldmine" wow!
@soloapplications94663 жыл бұрын
Awesome video, I loved you Tom
@ahmedahmedx96003 жыл бұрын
please which terminal theme tomnomnom used ?
@0xsunil3 жыл бұрын
Tom is best!
@mrrexder7910 Жыл бұрын
#TOMNOMNOM FOR EVER!
@bughunt25682 жыл бұрын
could you please share your recon methodology you applied on redbull as target.
@Stas1983ful3 жыл бұрын
Very nice and interesting video bro!
@chiragagrawal78563 жыл бұрын
Was it Recon Only ? Completely Mind Blowing stuff I saw today 🙌🙌🙌🙌🙌
@razmjumehdi9069 Жыл бұрын
Hello Ben 😊. please make a video about "Finding origin IP behind AWS CDN", because i searched a lot, but i found only video about Cloudflair bypass 🙏
@ВисторАндреевич4 ай бұрын
hey!!))) where i can find list configfiles ?))
@jayesh62902 жыл бұрын
Here Kali Linux is used right ?
@Rashedulcss3 жыл бұрын
Thanks Tom!
@otukencoffee72733 жыл бұрын
Tom is such a wizard
@lufom2 жыл бұрын
Is he previewing the `find` results? Does anyone know how to do that?
@faris98593 жыл бұрын
anew installation as mentioned in github not working for me. Anyone facing issues?
@yaseenzubair87923 жыл бұрын
Is tom operating himself on 1.5x?
@localmega58242 жыл бұрын
Two masters at work
@rushikeshchaudhari476 Жыл бұрын
How I can start with lve website bug bounty hunting
@n0w0nd3r53 жыл бұрын
It would be cool if you could list every command tomnomnom uses in this video in the description with a timestamp so people can go directly to that section to see what it does.. Or just watch the video.
@n0w0nd3r53 жыл бұрын
@hackR That's Cool.
@MrRaja2 жыл бұрын
Anyone got the list of all tomnomnom tools used in the video?
@orxanovn50572 жыл бұрын
naham bro this is gf and fff methodology or bug bounty methodology?))))
@aminumuhammed31143 жыл бұрын
I think this is the most useful technical video that is related to recon / bug bounty thank you @nahamsec thank you @tomnomnom
@remonsec1641 Жыл бұрын
insane 🔥
@saivenkatmaheshwaram98683 жыл бұрын
i didn't understand how he learn all this things and how he remember this all this commands and their particular options of a tools..
@parkour.11parkour582 жыл бұрын
Probably because it's an hobby for him. When you're not forced to do something that you love, you usually become an expert at it.
@shrumplestiltskin7922 Жыл бұрын
Where do we get the ass tool?
@CWLabs72092 жыл бұрын
Still in a dilemma how to filter hosts on basis of response body from fff; since, every host is responding with 200 OK 😢.
@rajanrawal63962 жыл бұрын
they are not filtering hosts they are just checking those hosts which thet have got liittle bit doubt
@thatguycrash22553 жыл бұрын
tomnomnom the goat
@beelostlove Жыл бұрын
So what's this worth this bug
@MrRaja2 жыл бұрын
I am not even sure what i am looking at. I know what he is looking at but i have no clue what to do with what he is looking at.
@Kas_Styles2 жыл бұрын
Just to point out that Auv5 is the Shopify security team member. Does anyone know if they have a twitter account?
@lilyrosestracke45912 жыл бұрын
...And this, ladies and gentlemen, is how you know you have failed recon101! 😅😜😉
@Kas_Styles2 жыл бұрын
@@lilyrosestracke4591 don't know why my comments keep getting deleted but I'll try posting it again
@Kas_Styles2 жыл бұрын
@@lilyrosestracke4591 I'm actually really good at recon. I have a public playlist (all osint videos) with at the time of writing this comment it's has 407 videos in it so from that you can tell that I know a lot about the topic.
@Kas_Styles2 жыл бұрын
@@lilyrosestracke4591 also, I have checked Google with Google dorks and Twitter and I didn't find anything related to the username.
@Kas_Styles2 жыл бұрын
@@lilyrosestracke4591 and another thing, you shouldn't be rude to others in general. I asked because I already did some research and I couldn't find it so I was asking. It's OK to ask questions, if anything its good and its how humans learn. Also, it's a social engineering skill which is used a lot in infosec so please don't share the idea that asking questions (after doing research and not finding anything useful/related) is bad because it's 100% not bad.
@farhonahmed50812 жыл бұрын
farhan ahmed was here at 10-31-22
@thenamehasbeenstolen4470Ай бұрын
he literally have 10 years + experience
@SrTCOT3 жыл бұрын
In this video I learned a lot of things thank you so much Nahamsec
@learnwithpikes3 жыл бұрын
what's up behrouz ?? how are you ??
@beelostlove Жыл бұрын
Hi did you miss me
@naveensaradhi69233 жыл бұрын
We want more live with tom #request
@Kas_Styles2 жыл бұрын
Whoxy the website can get historical whois.
@beelostlove Жыл бұрын
Just gave up her cover
@sadraasadi3 жыл бұрын
Nice :)
@charonxxi59853 жыл бұрын
💯
@imuser0073 жыл бұрын
I like tom
@Aravindb263 жыл бұрын
Huh man ...
@Virdoex3 жыл бұрын
Hey @Nahamsec what you deal with 403 subdomains
@bobmarley86443 жыл бұрын
Just keep bruteforcing for directories, maybe /login will return 200 or /api will return 400
@robinhood38413 жыл бұрын
i had a scenario where i have found a directory which returns 403 forbidden, so i kept brute forcing on that directory and eventually i got PhpMyAdmin mysql page and it was accessible for anyone and i was able to successfully login with a weak credentials :), thats why u shouldn't stop on a 403 they made it forbidden for a reason and simple miss configuration may give you a high result.
@Sakuraigi4 ай бұрын
@@bobmarley8644and for 401?
@x00-p3z3 жыл бұрын
🕵♀
@ThushyCyber3 жыл бұрын
Hi 👋
@LetsGoTech3 жыл бұрын
Problem number one I'm on Windows
@chiyoalice3272 жыл бұрын
Tom is not someone to follow . No My brain cells 😪 😭😭😭😭😭
@haxwizard20353 жыл бұрын
😁😀😁😁😁😁😁
@sandeepsingh872 жыл бұрын
Na bhai tune subtitles diye, na tune tools explain kre, aur apni accent mei tum log bol kya rhe ho ghanta samajh nhi aa rha ... Khud hi seekh le bhai, jab ye samajh aa jae ki "padhate kaise hai" tab video upload kr dena
@hellb0y7942 жыл бұрын
Ist: it's not his problem if you don't understand english first clear your basics then come here. they both are doing great work
@sandeepsingh872 жыл бұрын
@@hellb0y794 Fucking Dimwit, atleast read what I've written before commenting. I wrote "accent". Simplifying it for you, What it means is that, I do know English however I am having difficulty understanding their accent (Google the meaning of accent for more information) Also if you've even seen the starting of the video, you'll notice they are not teaching the basics here, they are talking about approaching a target i.e., their methodology. So, your statement about basics don't even make sense. I mean I don't mind you standing up for the hackers you admire but at least make some logical statement. Even I know these hackers know a lot more than me, but they have little to no idea "how to teach". This could've been structured into a nice course.
@ajaykumark1072 жыл бұрын
In the webpaste part the value he uses @1:06:26 are Code: [...document.querySelectorAll('div.g a:first-child')].map(n=>n.href) On Success: document.location=document.querySelectorAll('a#pnnext')[0].href;
@sushantr242 жыл бұрын
Cat from-findomain | why i m unable to run the command
@snehadeepgolui37579 ай бұрын
github dork not working please help [...document.querySelectorAll('.codesearch-results a.v-align-middle')].map(n=>n.href) it is not working