📚 Purchase my course and learn about bug bounty hunting with over 11 hours of content, 100+ labs: bugbounty.nahamsec.training
@kharbandaumang3 жыл бұрын
this is some GOD-LEVEL recon !!! We want more sessions from Tom. Thanks nahamsec for bringing this to the community and thanks Tom for sparing your time for this!!!
@alexander_adnan2 жыл бұрын
Lol .. 😂…GOD level would leave you speechless
@godspeed2124 Жыл бұрын
@@alexander_adnan what god level according to you?
@65hammad Жыл бұрын
@@alexander_adnanyou don't have a clue then. For mass recon, this is GOD-tier automation. These guys can even automate the entire process if they wanted.
@alexander_adnan9 ай бұрын
@@godspeed2124 looks like you will find out before others. Not a good idea to do reverse psychology, with strangers. I would be rational though, there’s no recipe for recon, it depends on your target while Technics matters less than the potential.
@cr4zy_0o3 жыл бұрын
The calmness that Tom have is really unique, great and fancy. + The way he do his things is really epic Really a great guy
@IBDLFSEragon4 ай бұрын
Mind blowing. Thank you so much for giving back to community.
@netoeli3 жыл бұрын
fantastic video , Tom really knows his stuff
@franco21793 жыл бұрын
It's funny because I can tell from Nahamsec's faces that he just loves Tomnomnom. At the same time it makes him laugh that he is so calm when explaining things.
@NahamSec3 жыл бұрын
Haha! Tom is one of the most genuine and nicest people I have had on the show.
@chasejensen883 жыл бұрын
I think he's also realizing the greatness he's capturing at the moment, he isn't fully comprehending it yet but he knows it.
@HenryLawrenceHMBL2 жыл бұрын
I would love to be a Shopify developer watching this unfold
@CWLabs72092 жыл бұрын
Every week i rewatch your videos; I am learning new things 💙.
@SankizTime Жыл бұрын
hora
@CWLabs7209 Жыл бұрын
@@SankizTime :D
@hayben70462 жыл бұрын
Thank you both for this great content. We want more videos with @TomNomNom.
@mateuszwasielewski719311 ай бұрын
I started watching this with hope of learning something. Ended with depression and one conclusion - I should stop learning this stuff if I'm gonna need to compete with maaany, maaany people as Tom. And as he said - it was his first attempt since like two years ago. I would need like a week to check all the things that he checked. Now I get it why entry-level positions needs few years of experience but in the same time I don't see a way to get this experience
@purplethunder7788 ай бұрын
If you think that the competitors out there are all as skillful as tom . You are very wrong
@rajanrawal63962 жыл бұрын
amazing, this could be probably one of the biggest information that i have ever been given. we need such playlist more and more in upcoming days. i hope i made you understand the things that i wanted to make you understand.. again, we need such playlist more and more in upcoming days.
@piusgabula2 жыл бұрын
This is byfar the most incredible live recon i have watched on youtube
@vonniehudson3 жыл бұрын
“ass, is that a new tool to compete with meg? I don’t know” had me rolling lololz
@BnayaProgramming3 жыл бұрын
Start at 5:59
@jeffreynoose2 жыл бұрын
I can watch these 50 times daily I love nomnom
@joefawcett2191 Жыл бұрын
these vim and bash skills are really something to behold
@bertrandfossung12163 жыл бұрын
This is epic!! I've have to watch this video over 10 times just to understand Tomnomnom's recon process. The guy is really really good at what he does. Thanks @nahamsec & @Tomnomnom🙏🏽🙏🏽🙏🏽
@samfisher84262 жыл бұрын
maan seeing how tom is working makes me feel down, this dude is so good
@ashleypursell97023 жыл бұрын
i was literaly looking for something just like anew to use in my automation since i run scans everday i want to add stuff to already existing txt files. i have seen people use it and idk why i only found out about it rn, great video thanks so much
@abdul-rahman7608 Жыл бұрын
Tom is a genius I must confess 🖤💯
@ca79863 жыл бұрын
Tom is really really good! He knows what he is doing! Amazing! Thanks Nahamsec for this video.
@baolamminh11463 жыл бұрын
I improve my bash skill much when watching this video. thanks Tomnomnom & Nahamsec
@gifbfbvhvhdhfhfjffjfnfhfb5152 жыл бұрын
best video ive seen in a long time
@amir-or6uf25 күн бұрын
it was awesome, thanks man.
@danieltamang22893 жыл бұрын
finally, the two underrated hunters!!
@affulsamuel72810 ай бұрын
That is why Hacking is time and patience game. i love the way he spend days to come on this i love this channel
@crusader_3 жыл бұрын
Could you please upload all the other recons
@The1994mattj6 ай бұрын
Would be interesting to see how different the process/tools look 3 years on.
@xrfox16343 жыл бұрын
I love this man!
@ggmaxx663 жыл бұрын
"...previous versions can be a goldmine" wow!
@theys68373 жыл бұрын
*TomNomNom* is a FKIN G 💯👏
@thenarrowgate30637 ай бұрын
I wish I had vim mastered in this way, I use nano which has some of the same features but vim has way more flexibility it's a language all it's own and it's why hackers prefer it, I mean true command based hackers..windows has spoiled this generation..nothing wrong with a GUI but hacking is about control and putting that level of control in a GUI is a major resource hog..TOM you are a dying breed, my hats off to you..grey that is
@ar-uh1dj3 жыл бұрын
He is truly a Genius!!!!!!!
@chiragagrawal78563 жыл бұрын
Was it Recon Only ? Completely Mind Blowing stuff I saw today 🙌🙌🙌🙌🙌
@0xsunil3 жыл бұрын
Tom is best!
@soloapplications94663 жыл бұрын
Awesome video, I loved you Tom
@Rashedulcss3 жыл бұрын
Thanks Tom!
@Stas1983ful3 жыл бұрын
Very nice and interesting video bro!
@otukencoffee72733 жыл бұрын
Tom is such a wizard
@localmega58242 жыл бұрын
Two masters at work
@thenamehasbeenstolen4470Ай бұрын
he literally have 10 years + experience
@mrrexder7910 Жыл бұрын
#TOMNOMNOM FOR EVER!
@remonsec1641 Жыл бұрын
insane 🔥
@ahmedahmedx96003 жыл бұрын
please which terminal theme tomnomnom used ?
@bughunt25682 жыл бұрын
could you please share your recon methodology you applied on redbull as target.
@ВисторАндреевич4 ай бұрын
hey!!))) where i can find list configfiles ?))
@razmjumehdi9069 Жыл бұрын
Hello Ben 😊. please make a video about "Finding origin IP behind AWS CDN", because i searched a lot, but i found only video about Cloudflair bypass 🙏
@n0w0nd3r53 жыл бұрын
It would be cool if you could list every command tomnomnom uses in this video in the description with a timestamp so people can go directly to that section to see what it does.. Or just watch the video.
@n0w0nd3r53 жыл бұрын
@hackR That's Cool.
@farhonahmed50812 жыл бұрын
farhan ahmed was here at 10-31-22
@rushikeshchaudhari476 Жыл бұрын
How I can start with lve website bug bounty hunting
@lufom2 жыл бұрын
Is he previewing the `find` results? Does anyone know how to do that?
@faris98593 жыл бұрын
anew installation as mentioned in github not working for me. Anyone facing issues?
@naveensaradhi69233 жыл бұрын
We want more live with tom #request
@SrTCOT3 жыл бұрын
In this video I learned a lot of things thank you so much Nahamsec
@jayesh62902 жыл бұрын
Here Kali Linux is used right ?
@thatguycrash22553 жыл бұрын
tomnomnom the goat
@beelostlove Жыл бұрын
So what's this worth this bug
@saivenkatmaheshwaram98683 жыл бұрын
i didn't understand how he learn all this things and how he remember this all this commands and their particular options of a tools..
@parkour.11parkour582 жыл бұрын
Probably because it's an hobby for him. When you're not forced to do something that you love, you usually become an expert at it.
@MrRaja2 жыл бұрын
Anyone got the list of all tomnomnom tools used in the video?
@sadraasadi3 жыл бұрын
Nice :)
@CWLabs72092 жыл бұрын
Still in a dilemma how to filter hosts on basis of response body from fff; since, every host is responding with 200 OK 😢.
@rajanrawal63962 жыл бұрын
they are not filtering hosts they are just checking those hosts which thet have got liittle bit doubt
@charonxxi59853 жыл бұрын
💯
@yaseenzubair87923 жыл бұрын
Is tom operating himself on 1.5x?
@orxanovn50572 жыл бұрын
naham bro this is gf and fff methodology or bug bounty methodology?))))
@Kas_Styles2 жыл бұрын
Just to point out that Auv5 is the Shopify security team member. Does anyone know if they have a twitter account?
@lilyrosestracke45912 жыл бұрын
...And this, ladies and gentlemen, is how you know you have failed recon101! 😅😜😉
@Kas_Styles2 жыл бұрын
@@lilyrosestracke4591 don't know why my comments keep getting deleted but I'll try posting it again
@Kas_Styles2 жыл бұрын
@@lilyrosestracke4591 I'm actually really good at recon. I have a public playlist (all osint videos) with at the time of writing this comment it's has 407 videos in it so from that you can tell that I know a lot about the topic.
@Kas_Styles2 жыл бұрын
@@lilyrosestracke4591 also, I have checked Google with Google dorks and Twitter and I didn't find anything related to the username.
@Kas_Styles2 жыл бұрын
@@lilyrosestracke4591 and another thing, you shouldn't be rude to others in general. I asked because I already did some research and I couldn't find it so I was asking. It's OK to ask questions, if anything its good and its how humans learn. Also, it's a social engineering skill which is used a lot in infosec so please don't share the idea that asking questions (after doing research and not finding anything useful/related) is bad because it's 100% not bad.
@MrRaja2 жыл бұрын
I am not even sure what i am looking at. I know what he is looking at but i have no clue what to do with what he is looking at.
@learnwithpikes3 жыл бұрын
what's up behrouz ?? how are you ??
@beelostlove Жыл бұрын
Just gave up her cover
@imuser0073 жыл бұрын
I like tom
@beelostlove Жыл бұрын
Hi did you miss me
@ThushyCyber3 жыл бұрын
Hi 👋
@shrumplestiltskin7922 Жыл бұрын
Where do we get the ass tool?
@baravind7193 жыл бұрын
Huh man ...
@Kas_Styles2 жыл бұрын
Whoxy the website can get historical whois.
@x00-p3z3 жыл бұрын
🕵♀
@Virdoex3 жыл бұрын
Hey @Nahamsec what you deal with 403 subdomains
@bobmarley86443 жыл бұрын
Just keep bruteforcing for directories, maybe /login will return 200 or /api will return 400
@robinhood38413 жыл бұрын
i had a scenario where i have found a directory which returns 403 forbidden, so i kept brute forcing on that directory and eventually i got PhpMyAdmin mysql page and it was accessible for anyone and i was able to successfully login with a weak credentials :), thats why u shouldn't stop on a 403 they made it forbidden for a reason and simple miss configuration may give you a high result.
@Sakuraigi4 ай бұрын
@@bobmarley8644and for 401?
@haxwizard20353 жыл бұрын
😁😀😁😁😁😁😁
@LetsGoTech3 жыл бұрын
Problem number one I'm on Windows
@chiyoalice3272 жыл бұрын
Tom is not someone to follow . No My brain cells 😪 😭😭😭😭😭
@sandeepsingh872 жыл бұрын
Na bhai tune subtitles diye, na tune tools explain kre, aur apni accent mei tum log bol kya rhe ho ghanta samajh nhi aa rha ... Khud hi seekh le bhai, jab ye samajh aa jae ki "padhate kaise hai" tab video upload kr dena
@hellb0y7942 жыл бұрын
Ist: it's not his problem if you don't understand english first clear your basics then come here. they both are doing great work
@sandeepsingh872 жыл бұрын
@@hellb0y794 Fucking Dimwit, atleast read what I've written before commenting. I wrote "accent". Simplifying it for you, What it means is that, I do know English however I am having difficulty understanding their accent (Google the meaning of accent for more information) Also if you've even seen the starting of the video, you'll notice they are not teaching the basics here, they are talking about approaching a target i.e., their methodology. So, your statement about basics don't even make sense. I mean I don't mind you standing up for the hackers you admire but at least make some logical statement. Even I know these hackers know a lot more than me, but they have little to no idea "how to teach". This could've been structured into a nice course.
@ajaykumark1072 жыл бұрын
In the webpaste part the value he uses @1:06:26 are Code: [...document.querySelectorAll('div.g a:first-child')].map(n=>n.href) On Success: document.location=document.querySelectorAll('a#pnnext')[0].href;
@aminumuhammed31143 жыл бұрын
I think this is the most useful technical video that is related to recon / bug bounty thank you @nahamsec thank you @tomnomnom
@sushantr242 жыл бұрын
Cat from-findomain | why i m unable to run the command
@snehadeepgolui37578 ай бұрын
github dork not working please help [...document.querySelectorAll('.codesearch-results a.v-align-middle')].map(n=>n.href) it is not working