Buy my bounty course here: app.hackinghub.io/hubs/nahamsec-bug-bounty-course Discord: Discord.gg/NahamSec
@rokkamvamsi189 ай бұрын
00:06 Bug Hunters Methodology V4.0 is split into two parts: Recon and Application Analysis. 02:31 Project tracking is an important part of the bug bounty and pen testing methodology 06:40 Wide recon involves multiple distinct sections of work 08:42 Verizon Media's bug bounty program has a wide scope. 12:58 Automating recon can be risky without proper context 15:27 Using ASN numbers and IP scanning to gather seed domains for recon. 19:34 The Bug Hunter's Methodology v4.0 - Recon Edition by @jhaddix #NahamCon2020! 21:37 Finding related domains and seed domains 25:40 Link discovery using Burp Suite for finding linked assets or links inside a site. 27:49 Passive scanning using Burp and setting advanced scope control with a keyword. 31:24 Using Burp Suite Pro to extract data can be clumsy. 33:24 Different tools and methods for URL crawling and subdomain discovery 37:17 Subdomain scraping is a crucial step for finding more assets 39:13 Methods for finding subdomains include using search engines and subdomain scraping tools like amass and subfinder. 43:05 Twitch uses various cloud technologies and third-party services 45:08 Use the github subdomains dot py tool to find hidden subdomains on github. 49:13 Using subdomain enumeration tools for bug hunting 51:02 Scraping cloud ranges and scanning SSL certificates help in finding hidden dev sites. 55:13 Using a large list of common subdomain names to resolve them and find any successful connections. 57:03 There are two approaches to building word lists: tailored lists and all-encompassing massive lists. 1:00:54 Use custom word lists related to Twitch for DNS subverting to find potential related domains. 1:02:48 Using permutation scanning to find obscure subdomains and bypass web location firewalls. 1:06:42 Use the tool 'masscan' for fast port scanning on IP addresses. 1:08:36 Using en masse scan as a wrapper around mask to resolve domains and perform port scanning. 1:12:50 Bash script to perform Github Dorking and find leaked sensitive information 1:14:45 Utilize automated tools and GitHub for effective reconnaissance. 1:18:37 Subdomain takeover vulnerability can result in the takeover of legitimate traffic of former domains. 1:20:49 Nuclei is a comprehensive scanning framework with subdomain takeover templates. 1:24:52 Interlace and Tom nomnom's tools are useful for automating workflow in bug hunting. 1:26:40 Different tiers of recon frameworks based on automation and workflow 1:30:12 Different tiers of recon methodologies 1:32:06 Intrigue and Assetnote are powerful SAS services for reconnaissance and asset management. 1:36:03 The Bug Hunter's Methodology v4.0 - Recon Edition 1:38:04 Appreciation for the bug bounty and pen test community
@pentestical4 жыл бұрын
I can't believe how much free content you provide. Thanks!!
@edwinosantos3 жыл бұрын
Dominican Republic we have a saying, maybe other places do too, when something is too good to be true usually isnt but maaaaaaan this is good content. Nahamsec you are the man!! thanks for gathering all those super smart dudes and freely allow us to learn from then. Thank you Thank You.
@TheWhaleon2 жыл бұрын
I will probably watch this five more times. So unbelievable useful information. Thank you!
@AnlStarDestroyer3 жыл бұрын
I’ve been messing around with bug bounty for awhile now but never seriously giving it a go, I usually poke around and do basic manual stuff then if nothing happens in an hour or so then I stop and start from scratch again in a week or two. I think this next time I’m going to pick a program, literally follow along with this video as I go and save all my scan results and notes so I can pick up where I left off with the same program.
@WtfAnupam2 жыл бұрын
First try to hunt on Government programs, then Vdps then go for platforms with low users, you will learn a lot👍🏼
@emmanuelchinedum69982 жыл бұрын
@@WtfAnupam what are the vdps and govt program?
@WtfAnupam2 жыл бұрын
@@emmanuelchinedum6998 VDP - Vulnerability Disclosure Program, Govt program - Country government sites ( programs ) like Indian, US, Dutch sites
@emmanuelchinedum69982 жыл бұрын
@@WtfAnupam thankyou
@emmanuelchinedum69982 жыл бұрын
@@WtfAnupam I'm new to bug bounty lol…i just finished the sql labs on portswigger so i wanna test out what i know….i think i need to learn recon first right?
@randallcharlestuckermrcyse14792 жыл бұрын
Thank you for the Methodology, as I am starting out on Bug Hunting and most automated tools are not welcomed, so I was stumped on how to be able to Bug Hunt. I am going to learn from this video and start my Bug Hunting to earn Rep + Money is the bonus.
@bata3258 Жыл бұрын
how's the progress going???
@nehalahmad114 жыл бұрын
The contents are amazing. The only problem is video quality, Please atleast 720p
@angeldev964 жыл бұрын
waited for this so much!! Now upload the tomnomnom talk plz.
@g33kyf3z2 жыл бұрын
Thanks for all the great information from this keynote. Got some really good notes for my B.B Journey.
@rodgers483 жыл бұрын
five minutes of your video guive more information on Recon as opposed of all i have learned in the past, Terrific
@andreasMou1234 жыл бұрын
YES! I've been waiting for this forever. Thanks for the all the good content naham, you're true legend!
@HassanRaza-ek3mv Жыл бұрын
"Where can I get these slides?" to "Screenshotted the all slides" Love from Sweden :)
@muralikumarrr3 жыл бұрын
Your name 'jason haddix' sounds like someone who plays the lead role in an action flix
@ichigok25944 жыл бұрын
Nice. Always learning new tools from here. 🙏
@SICKFREDO4 жыл бұрын
Hell yeah right before the weekend
@NauSikhiya-sf3gf3 ай бұрын
loved it bro jason dude you are cool bro and ben dude you too thanks for the marvelous content
@mazingerzeta2xx7884 жыл бұрын
This is GReat!, where can get the whole list of the tools, or copy of these sides? thanks
@badsharma44134 жыл бұрын
really big thanks @nahamsec love from nepal !!!!
@sail3sh7034 жыл бұрын
hora vanya..
@cimihan48164 жыл бұрын
teita
@SankizTime3 жыл бұрын
Oho, Nepali hackersssssss
@bata3258 Жыл бұрын
@@cimihan4816 huff ma 2 barsa late vayexu
@cimihan4816 Жыл бұрын
@@bata3258 haha
@irph24 жыл бұрын
Nice one, 1080p please :(
@rafajanicki24564 жыл бұрын
Super Cool :D Thanks Jason Haddix for this talk and NahamSec for posting this on YT :) Sooo many new tools and techniques to test! You're awesome Guys :)
@FredsRandomFinds2 жыл бұрын
He mentions a tool for scraping keywords around half way through? anyone know what tool this is?
@tommysuriel4 жыл бұрын
what about aquatone for subdomain takeover checks?
@JasonGomes1402944 жыл бұрын
Been Waiting for this.... thanks Ben 🙌
@Alex-oh6lj3 жыл бұрын
Is there a pdf or book written for this content?
@Євгеній-ф7ш4 жыл бұрын
amazing! Thank you!
@Anonymous-ik7nr2 жыл бұрын
Thanks for the lessons. Will keep learning. Lol
@WMarco933 жыл бұрын
so much value in this video! thanks :)
@欧文-c4d4 жыл бұрын
If there is a PPT to provide IU, it will be more nice
@nightninja81283 жыл бұрын
Bro this is amazing!
@miracdasmine4 жыл бұрын
I wish those links he showed can be listed here
@maxicorbs3 жыл бұрын
Was the TBHM v4 Application Analysis edition ever released? Can't find a link, thanks
@goebbelsx4 жыл бұрын
Awesome!
@hetvikam47544 жыл бұрын
can i get that ppt
@Siik94Skillz2 жыл бұрын
95% of the people in here wont get past installation of all the tools and give up... I know this because that was me when I started
@hackingetico1 Жыл бұрын
Amigo yo puedo hacer
@Siik94Skillz Жыл бұрын
@@hackingetico1 bueno que tal tu primer bug entonces?
@premprakash61383 жыл бұрын
You are great
@UnhingedRoads2 жыл бұрын
what is happening after recon
@sarfraztek4 жыл бұрын
you rock ! NAHAMsec
@secmind55204 жыл бұрын
jason haddix is the best
@cyberpirate0074 жыл бұрын
Indians like here....... Indian hackers show our unity by hitting the like--
@MotivationKrishna2 жыл бұрын
Can we Get TIme Stamp
@Better4033 жыл бұрын
You are a legend
@cuti72338 ай бұрын
pdf spanish ?The Bug Hunter's Methodology v4.0 - Recon Edition by @jhaddix???
@albertkentbanico98224 жыл бұрын
Thanks Senpai!
@KAFOSHY4 жыл бұрын
😍🙏🥺thanks bro
@hackingetico1 Жыл бұрын
Oye bro quede en 13:22
@bubbanstix8412 жыл бұрын
jason. You have my head. Nice names for your daughters. I hope i will be same as you. Thnks btw.
I am absolutely new to bug hunting and the problem that I am facing is "When I catch a request in burp it is really confusing I can't understand which request to work on and which to not I get really confused" please help if you can .
@shemot9114 жыл бұрын
TomNomNoms Talk?
@TomNomNomDotCom4 жыл бұрын
kzbin.info/www/bejne/jWXCgnaJftqdh5Y
@tamjid0x014 жыл бұрын
@shrirangkahale4 жыл бұрын
This is great But where is Binod & Pls don't put add in betn. the video..... Especially when it is High quality speech Byee Binod
@aadhi50063 жыл бұрын
Hii guys, iam a beginner web application enthusiastic. Who is interested web application security.well, I thought i know some foundation's so, I want to touch a security issues. Iam confused which one is good resource and which one to pick and start.: portswigger notes or owsap top 10 or web application hackers hand book iam stuck could you suggest me to become a good web pentester.