Рет қаралды 27,072
In this video, I will demonstrate a bug bounty hunting methodology on a CTF website that mimics a bug bounty target. I will start from scratch and become admin on multiple web applications. Many techniques will be used: Subdomain enumeration, directory bruteforcing, using tools such as assetfinder, ffuf and Burp Suite Intruder.
- Download your FREE Web hacking LAB: thehackerish.com/owasp-top-10...
- Read more on the blog: thehackerish.com/my-bug-bount...
- Support this work: thehackerish.com/how-to-support
- Facebook Page: / thehackerish
- Follow us on Twitter: / thehackerish
- Listen on Anchor: anchor.fm/thehackerish- Listen on Spotify: open.spotify.com/show/4Ht8jEb...
- Listen on Google Podcasts: podcasts.google.com/?feed=aHR...
Thumbnail photo by Andrea Piacquadio from Pexels