Easiest Way To Get A Critical Bug And Into A Company's Infrastructure?

📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
💵 Support the Channel:
You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
☕️ Buy Me Coffee:
www.buymeacoffee.com/nahamsec
JOIN DISCORD:
discordapp.com/invite/ucCz7uh
🆓 🆓 🆓 $200 DigitalOcean Credit:
m.do.co/c/3236319b9d0b
💬 Social Media
- / nahamsec
- / nahamsec
- twitch.com/nahamsec
- / nahamsec1
#bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp

Пікірлер: 40

  • @constantRic
    @constantRic4 ай бұрын

    yes please more content of the things you enjoy talking about. Definitely breaking down these kind of process makes it really easy to understand.

  • @Tartaro_TP
    @Tartaro_TP4 ай бұрын

    Naham sigue con videos profundizando en RECON, SOS el puto AMO, aprendo una banda con tu videos gracias hermano, saludos desde Madariaga!

  • @user-jz8vq7wo5z
    @user-jz8vq7wo5z4 ай бұрын

    Yes really enjoy it .. waiting for great content thanks

  • @MarkFoudy
    @MarkFoudy4 ай бұрын

    thank you as always for your content!

  • @lol-hz9mc
    @lol-hz9mc4 ай бұрын

    Thank you it gave me new way to look our for interesting domains.

  • @Casp1anX
    @Casp1anX4 ай бұрын

    Yeah this is petty high value. Especially since it replaces the “automated bug hunting” with an intentional starting point. Definitely interested in other recon ideas you prefer

  • @abhishekjain4883
    @abhishekjain48834 ай бұрын

    As a begineer in this feild i would like to listen more content like this and bit lengthy one alos where you give clear and deep explanation about the topic

  • @papafhill9126
    @papafhill91264 ай бұрын

    These small hands on walk-throughs are pretty invaluable. Teaching people (1) terminal usage, and (2) another way to go through the massive subs/ends list after all that fuzzing/spidering... it's just really helpful given all the things we need to learn to approaching a big system. Thank you (and more deep dive / hands on usage videos, please)!

  • @mgillanders
    @mgillanders4 ай бұрын

    cheers always informative!

  • @Loopbob4
    @Loopbob44 ай бұрын

    The best Hunter ❤ thanks man

  • @GhtsGameplay
    @GhtsGameplay4 ай бұрын

    This is Good. I usually go for eyewitness and then eyeballer on it. And Dorking for any pages with registration

  • @bakeery

    @bakeery

    4 ай бұрын

    Could you explain what you mean pl, I did not understand

  • @mysteriousministar2481
    @mysteriousministar24814 ай бұрын

    Nice video bro❤❤

  • @CarlosFerreiraOfficial
    @CarlosFerreiraOfficialАй бұрын

    Hi sir, great content as always. A quick question. Would a pen testing certification that focus on networks and infra such as the OSCP or PNPT be useful at all for bug bounty programs? I'm asking because I see mostly mobile and web apps in scope? Thank you

  • @prakhar0x01
    @prakhar0x014 ай бұрын

    Waiting for H1-305 vlog.

  • @0xKingSlayer
    @0xKingSlayer2 ай бұрын

    More of this type of content please

  • @elkins540
    @elkins5404 ай бұрын

    Yes please I will like more content like this.

  • @AindriuMacGiollaEoin
    @AindriuMacGiollaEoin4 ай бұрын

    Great content

  • @PALLAB194
    @PALLAB1944 ай бұрын

    Love from India ♥️

  • @Suniil_07
    @Suniil_074 ай бұрын

    wow!!! it's was awesome! thank you @NahamSec

  • @user-bn2nv5mx2g
    @user-bn2nv5mx2g4 ай бұрын

    #Internal. For a video idea can you go over all the different types of internal assets and potential exposures/leaks ie. Jenkins, Jira, Sonar and others.

  • @sebastianhyjek3427
    @sebastianhyjek34274 ай бұрын

    Hey Naham I have a good amount of experience with JS and HTML, I know good amount of python and java a while ago i built a few personal websites as projects but I have always wanted to get into hacking I really see myself falling inline with it. I have watched many of your videos. But I’m still not sure where to start because XSS feels a bit complicated and portswigger says to start with SQLi. What do you recommend?

  • @00Jimmy00
    @00Jimmy004 ай бұрын

    ok but usually domains with *git*, *dev* or *sonar* are not reacable from internet so how i can access them ? when i scan with nmap i got error

  • @amaduscamara4378
    @amaduscamara43784 ай бұрын

    Good video

  • @chhachhiawan
    @chhachhiawan4 ай бұрын

    Amazing

  • @jesseoruma5710
    @jesseoruma57104 ай бұрын

    Internal 🔥

  • @rctech1237
    @rctech12374 ай бұрын

    ❤❤❤❤

  • @meljithpereira5532
    @meljithpereira55324 ай бұрын

    what happended to your finger ?

  • @brs2379
    @brs23794 ай бұрын

    internal

  • @lifeofsq5653
    @lifeofsq56534 ай бұрын

    #Internal

  • @itsm3dud39
    @itsm3dud394 ай бұрын

    Internal

  • @rctech1237
    @rctech12374 ай бұрын

    First comment

  • @NahamSec

    @NahamSec

    4 ай бұрын

    LETS GOOO

  • @rctech1237

    @rctech1237

    4 ай бұрын

    Bro can you make a series for bug bounty means teach complete bug bounty please its my request❤❤

  • @skyedunphy

    @skyedunphy

    4 ай бұрын

    @@rctech1237 exactly thats what we all need

  • @vz7742

    @vz7742

    4 ай бұрын

    ​@@rctech1237no. If you want to learn,get ready to get your hands dirty. No hands hodling!!

  • @rctech1237

    @rctech1237

    4 ай бұрын

    ​@@vz7742why bro ??

  • @Tartaro_TP
    @Tartaro_TP4 ай бұрын

    Naham sigue con videos profundizando en RECON, SOS el puto AMO, aprendo una banda con tu videos gracias hermano, saludos desde Madariaga!

  • @hiamealhilwa6684
    @hiamealhilwa66843 ай бұрын

    internal