The Bug Hunter's Methodology v4.0 - Recon Edition by

  Рет қаралды 151,086

NahamSec

NahamSec

Күн бұрын

Пікірлер: 83
@NahamSec
@NahamSec 29 күн бұрын
Buy my bounty course here: app.hackinghub.io/hubs/nahamsec-bug-bounty-course Discord: Discord.gg/NahamSec
@rokkamvamsi18
@rokkamvamsi18 9 ай бұрын
00:06 Bug Hunters Methodology V4.0 is split into two parts: Recon and Application Analysis. 02:31 Project tracking is an important part of the bug bounty and pen testing methodology 06:40 Wide recon involves multiple distinct sections of work 08:42 Verizon Media's bug bounty program has a wide scope. 12:58 Automating recon can be risky without proper context 15:27 Using ASN numbers and IP scanning to gather seed domains for recon. 19:34 The Bug Hunter's Methodology v4.0 - Recon Edition by @jhaddix #NahamCon2020! 21:37 Finding related domains and seed domains 25:40 Link discovery using Burp Suite for finding linked assets or links inside a site. 27:49 Passive scanning using Burp and setting advanced scope control with a keyword. 31:24 Using Burp Suite Pro to extract data can be clumsy. 33:24 Different tools and methods for URL crawling and subdomain discovery 37:17 Subdomain scraping is a crucial step for finding more assets 39:13 Methods for finding subdomains include using search engines and subdomain scraping tools like amass and subfinder. 43:05 Twitch uses various cloud technologies and third-party services 45:08 Use the github subdomains dot py tool to find hidden subdomains on github. 49:13 Using subdomain enumeration tools for bug hunting 51:02 Scraping cloud ranges and scanning SSL certificates help in finding hidden dev sites. 55:13 Using a large list of common subdomain names to resolve them and find any successful connections. 57:03 There are two approaches to building word lists: tailored lists and all-encompassing massive lists. 1:00:54 Use custom word lists related to Twitch for DNS subverting to find potential related domains. 1:02:48 Using permutation scanning to find obscure subdomains and bypass web location firewalls. 1:06:42 Use the tool 'masscan' for fast port scanning on IP addresses. 1:08:36 Using en masse scan as a wrapper around mask to resolve domains and perform port scanning. 1:12:50 Bash script to perform Github Dorking and find leaked sensitive information 1:14:45 Utilize automated tools and GitHub for effective reconnaissance. 1:18:37 Subdomain takeover vulnerability can result in the takeover of legitimate traffic of former domains. 1:20:49 Nuclei is a comprehensive scanning framework with subdomain takeover templates. 1:24:52 Interlace and Tom nomnom's tools are useful for automating workflow in bug hunting. 1:26:40 Different tiers of recon frameworks based on automation and workflow 1:30:12 Different tiers of recon methodologies 1:32:06 Intrigue and Assetnote are powerful SAS services for reconnaissance and asset management. 1:36:03 The Bug Hunter's Methodology v4.0 - Recon Edition 1:38:04 Appreciation for the bug bounty and pen test community
@pentestical
@pentestical 4 жыл бұрын
I can't believe how much free content you provide. Thanks!!
@edwinosantos
@edwinosantos 3 жыл бұрын
Dominican Republic we have a saying, maybe other places do too, when something is too good to be true usually isnt but maaaaaaan this is good content. Nahamsec you are the man!! thanks for gathering all those super smart dudes and freely allow us to learn from then. Thank you Thank You.
@TheWhaleon
@TheWhaleon 2 жыл бұрын
I will probably watch this five more times. So unbelievable useful information. Thank you!
@AnlStarDestroyer
@AnlStarDestroyer 3 жыл бұрын
I’ve been messing around with bug bounty for awhile now but never seriously giving it a go, I usually poke around and do basic manual stuff then if nothing happens in an hour or so then I stop and start from scratch again in a week or two. I think this next time I’m going to pick a program, literally follow along with this video as I go and save all my scan results and notes so I can pick up where I left off with the same program.
@WtfAnupam
@WtfAnupam 2 жыл бұрын
First try to hunt on Government programs, then Vdps then go for platforms with low users, you will learn a lot👍🏼
@emmanuelchinedum6998
@emmanuelchinedum6998 2 жыл бұрын
@@WtfAnupam what are the vdps and govt program?
@WtfAnupam
@WtfAnupam 2 жыл бұрын
@@emmanuelchinedum6998 VDP - Vulnerability Disclosure Program, Govt program - Country government sites ( programs ) like Indian, US, Dutch sites
@emmanuelchinedum6998
@emmanuelchinedum6998 2 жыл бұрын
@@WtfAnupam thankyou
@emmanuelchinedum6998
@emmanuelchinedum6998 2 жыл бұрын
@@WtfAnupam I'm new to bug bounty lol…i just finished the sql labs on portswigger so i wanna test out what i know….i think i need to learn recon first right?
@randallcharlestuckermrcyse1479
@randallcharlestuckermrcyse1479 2 жыл бұрын
Thank you for the Methodology, as I am starting out on Bug Hunting and most automated tools are not welcomed, so I was stumped on how to be able to Bug Hunt. I am going to learn from this video and start my Bug Hunting to earn Rep + Money is the bonus.
@bata3258
@bata3258 Жыл бұрын
how's the progress going???
@nehalahmad11
@nehalahmad11 4 жыл бұрын
The contents are amazing. The only problem is video quality, Please atleast 720p
@angeldev96
@angeldev96 4 жыл бұрын
waited for this so much!! Now upload the tomnomnom talk plz.
@g33kyf3z
@g33kyf3z 2 жыл бұрын
Thanks for all the great information from this keynote. Got some really good notes for my B.B Journey.
@rodgers48
@rodgers48 3 жыл бұрын
five minutes of your video guive more information on Recon as opposed of all i have learned in the past, Terrific
@andreasMou123
@andreasMou123 4 жыл бұрын
YES! I've been waiting for this forever. Thanks for the all the good content naham, you're true legend!
@HassanRaza-ek3mv
@HassanRaza-ek3mv Жыл бұрын
"Where can I get these slides?" to "Screenshotted the all slides" Love from Sweden :)
@muralikumarrr
@muralikumarrr 3 жыл бұрын
Your name 'jason haddix' sounds like someone who plays the lead role in an action flix
@ichigok2594
@ichigok2594 4 жыл бұрын
Nice. Always learning new tools from here. 🙏
@SICKFREDO
@SICKFREDO 4 жыл бұрын
Hell yeah right before the weekend
@NauSikhiya-sf3gf
@NauSikhiya-sf3gf 3 ай бұрын
loved it bro jason dude you are cool bro and ben dude you too thanks for the marvelous content
@mazingerzeta2xx788
@mazingerzeta2xx788 4 жыл бұрын
This is GReat!, where can get the whole list of the tools, or copy of these sides? thanks
@badsharma4413
@badsharma4413 4 жыл бұрын
really big thanks @nahamsec love from nepal !!!!
@sail3sh703
@sail3sh703 4 жыл бұрын
hora vanya..
@cimihan4816
@cimihan4816 4 жыл бұрын
teita
@SankizTime
@SankizTime 3 жыл бұрын
Oho, Nepali hackersssssss
@bata3258
@bata3258 Жыл бұрын
@@cimihan4816 huff ma 2 barsa late vayexu
@cimihan4816
@cimihan4816 Жыл бұрын
@@bata3258 haha
@irph2
@irph2 4 жыл бұрын
Nice one, 1080p please :(
@rafajanicki2456
@rafajanicki2456 4 жыл бұрын
Super Cool :D Thanks Jason Haddix for this talk and NahamSec for posting this on YT :) Sooo many new tools and techniques to test! You're awesome Guys :)
@FredsRandomFinds
@FredsRandomFinds 2 жыл бұрын
He mentions a tool for scraping keywords around half way through? anyone know what tool this is?
@tommysuriel
@tommysuriel 4 жыл бұрын
what about aquatone for subdomain takeover checks?
@JasonGomes140294
@JasonGomes140294 4 жыл бұрын
Been Waiting for this.... thanks Ben 🙌
@Alex-oh6lj
@Alex-oh6lj 3 жыл бұрын
Is there a pdf or book written for this content?
@Євгеній-ф7ш
@Євгеній-ф7ш 4 жыл бұрын
amazing! Thank you!
@Anonymous-ik7nr
@Anonymous-ik7nr 2 жыл бұрын
Thanks for the lessons. Will keep learning. Lol
@WMarco93
@WMarco93 3 жыл бұрын
so much value in this video! thanks :)
@欧文-c4d
@欧文-c4d 4 жыл бұрын
If there is a PPT to provide IU, it will be more nice
@nightninja8128
@nightninja8128 3 жыл бұрын
Bro this is amazing!
@miracdasmine
@miracdasmine 4 жыл бұрын
I wish those links he showed can be listed here
@maxicorbs
@maxicorbs 3 жыл бұрын
Was the TBHM v4 Application Analysis edition ever released? Can't find a link, thanks
@goebbelsx
@goebbelsx 4 жыл бұрын
Awesome!
@hetvikam4754
@hetvikam4754 4 жыл бұрын
can i get that ppt
@Siik94Skillz
@Siik94Skillz 2 жыл бұрын
95% of the people in here wont get past installation of all the tools and give up... I know this because that was me when I started
@hackingetico1
@hackingetico1 Жыл бұрын
Amigo yo puedo hacer
@Siik94Skillz
@Siik94Skillz Жыл бұрын
@@hackingetico1 bueno que tal tu primer bug entonces?
@premprakash6138
@premprakash6138 3 жыл бұрын
You are great
@UnhingedRoads
@UnhingedRoads 2 жыл бұрын
what is happening after recon
@sarfraztek
@sarfraztek 4 жыл бұрын
you rock ! NAHAMsec
@secmind5520
@secmind5520 4 жыл бұрын
jason haddix is the best
@cyberpirate007
@cyberpirate007 4 жыл бұрын
Indians like here....... Indian hackers show our unity by hitting the like--
@MotivationKrishna
@MotivationKrishna 2 жыл бұрын
Can we Get TIme Stamp
@Better403
@Better403 3 жыл бұрын
You are a legend
@cuti7233
@cuti7233 8 ай бұрын
pdf spanish ?The Bug Hunter's Methodology v4.0 - Recon Edition by @jhaddix???
@albertkentbanico9822
@albertkentbanico9822 4 жыл бұрын
Thanks Senpai!
@KAFOSHY
@KAFOSHY 4 жыл бұрын
😍🙏🥺thanks bro
@hackingetico1
@hackingetico1 Жыл бұрын
Oye bro quede en 13:22
@bubbanstix841
@bubbanstix841 2 жыл бұрын
jason. You have my head. Nice names for your daughters. I hope i will be same as you. Thnks btw.
@limeeater22
@limeeater22 3 жыл бұрын
can we download the slides?
@seantrondnb
@seantrondnb 3 жыл бұрын
I found the pdf on google, just look for it.
@rodricbr
@rodricbr 2 жыл бұрын
docs.google.com/presentation/d/1MWWXXRvvesWL8V-GiwGssvg4iDM58_RMeI_SZ65VXwQ/edit#slide=id.g89b65a088d_1_0
@sakettestsakettest8009
@sakettestsakettest8009 4 жыл бұрын
Plz upload secureinti talk
@cbbitv2534
@cbbitv2534 4 жыл бұрын
Hi bro can I privately chat with you
@hacktivist8457
@hacktivist8457 4 жыл бұрын
Direct like ❤
@TheConstantLearnerGuy
@TheConstantLearnerGuy 2 жыл бұрын
:)
@AdedayoEnoch
@AdedayoEnoch 2 ай бұрын
29, 32:10
@AutismusMaximus1
@AutismusMaximus1 4 жыл бұрын
One can either be father of 3 or gamer. Not both!
@krshreyansh
@krshreyansh 4 жыл бұрын
I am absolutely new to bug hunting and the problem that I am facing is "When I catch a request in burp it is really confusing I can't understand which request to work on and which to not I get really confused" please help if you can .
@shemot911
@shemot911 4 жыл бұрын
TomNomNoms Talk?
@TomNomNomDotCom
@TomNomNomDotCom 4 жыл бұрын
kzbin.info/www/bejne/jWXCgnaJftqdh5Y
@tamjid0x01
@tamjid0x01 4 жыл бұрын
@shrirangkahale
@shrirangkahale 4 жыл бұрын
This is great But where is Binod & Pls don't put add in betn. the video..... Especially when it is High quality speech Byee Binod
@aadhi5006
@aadhi5006 3 жыл бұрын
Hii guys, iam a beginner web application enthusiastic. Who is interested web application security.well, I thought i know some foundation's so, I want to touch a security issues. Iam confused which one is good resource and which one to pick and start.: portswigger notes or owsap top 10 or web application hackers hand book iam stuck could you suggest me to become a good web pentester.
The Blueprint to Your First $1,000+ Bounty
12:14
NahamSec
Рет қаралды 7 М.
What Should You Do After Recon?!
14:47
NahamSec
Рет қаралды 30 М.
Don't underestimate anyone
00:47
奇軒Tricking
Рет қаралды 19 МЛН
كم بصير عمركم عام ٢٠٢٥😍 #shorts #hasanandnour
00:27
hasan and nour shorts
Рет қаралды 10 МЛН
The Bug Hunter's Methodology Full 2-hour Training by Jason Haddix
1:53:53
Red Team Village
Рет қаралды 169 М.
The Bug Hunter’s Methodology Jason Haddix @jhaddix
1:16:16
Red Team Village
Рет қаралды 48 М.
Who, What, Where, When, Wordlist by @TomNomNom #NahamCon2020
49:43
“Recon Like an Adversary” by Jason Haddix at IWCON2023
1:01:13
Infosec Studio by IW
Рет қаралды 17 М.
#NahamCon2024: .js Files Are Your Friends | @zseano
24:04
NahamSec
Рет қаралды 10 М.