Beginner to Advanced Bug Bounty Hunting Course | 2022

preview_player
Показать описание
All my videos are for educational purposes with bug bounty hunters and penetration testers in mind YouTube don't take down my videos 😉

Ethical hacking web application hacking and bug bounty hunting

links to resources used in this course

0:00 About the course
1:57 Kali Linux Install
12:35 ALL about Recon
01:57:30 URL Hacking
02:19:52 Installing Juice Shop
02:28:06 IDOR & BL
03:16:25 SQL injection
04:29:58 Path Traversal
04:48:10 XML & XXE
05:01:41 XSS Cross Site Scripting
05:26:11 HTML & JavaScript
06:22:27 API Enumeration
06:24:52 SSRF Server Side Request Forgery
06:47:27 Command Injection
07:13:26 File Upload
07:34:42 LFI & RFI
08:03:48 Cookies and Tokens
08:24:28 Wordpress and CMS
08:48:25 Introduction to Python
09:43:43 Python GitHub Scraper
10:40:10 Introduction to Bash Scripting
Рекомендации по теме
Комментарии
Автор

was in college for 2 years for my bachelors in cyber security learned more in this vid than school and my professors thanks ryan !

sleighhjayy
Автор

This is start of my career journey wish me Luck and may luck be with you too

adworksout
Автор

Man respect for you. You uploaded a video of 11 hours. You are the real superhero.

arkapalbhattacharya
Автор

great course, a helpful tip for efficiency in the linux shell is to use 'cntrl a' to go to the beginning of your command, 'cntrl e' goes to the end, 'alt f' goes forward one word and 'alt b' goes backwards one word. much more efficient than using just the arrow keys .. lastly '!!' will run the most recent command again but as sudo.

rordanstanton
Автор

Last year i was interested in hacking, so i watched this video without any prior knowledge, now, because of this video, i have a masters in cyber security

warrigeotter
Автор

I'm on my journey to bug bounty and I couldn't be happier with your course. You are a great teacher, easy to understand and very straight forward. Love from Portugal! :D

joaoteixeira
Автор

I saved this video about six months ago but could never go past the first 30-40 mins. This time however, I have sit on it for the last four days keeping some time aside each day going through the video section by section, taking notes, doing those juice shop and portswigger exercises in parallel and watching htb & thm exercises as you were doing, and then doing those python and bash exercises as you were explaining. Finally, I have completed the video few mins ago!!. It's a nice feel now!
The knowledge gained in the process is simply invaluable. Thank you lots for such a great video with truly a wealth of information explained in a friendly and engaging way!! 😀

getstart
Автор

I am only 1 hour in, but this is such a great run down of bug bounty hunting from the ground up. Really appreciate this and all the work that went into making such a drastically long video. One thing that I think would be interesting would be to video a bug bounty attempt from beginning to end of a legitimate successful bug bounty, and then upon bug fix by the company then release the entire course you use to get to the finished stage. Just to see how all of these methods come together into a cohesive successful (or not) hunt.

michaelfranco
Автор

This is amazing. I ended up coding a python script to substitute burp intruder on the blind condition based sqli exercise and it ended up being so much faster than burp! The part of the video in which you were going to show a faster manual way got cut, so that's how I managed hahah

cybersec
Автор

Thank you, bro
No any other platforms are giving this much of information on cybersecurity, but you made us to feel humble on you, thank you so much. Don't feel sad bro, great things take time, not only you have small youtube channel you have the talent and it will generate you income don't feel sad. Thank you once again

movieminded
Автор

You will get to the top, you are the real definition of greatness

noelkitonga
Автор

I think the answer for the question in 8:01:42 could be like, the "access-token" string only, in the object evaluates to true by default, because it is a non empty string, so evaluates to true. The part of i: 0; evaluates to false, because empty integer evaluates to false, like 0 = false. Then the comparison of "access-token" being (true) OR i: 0 being (false) evaluates to true.
So when the value of b: 1 replace i: 0, then the comparison only evaluates the first part ("access-token") string as true (because is a non empty string), and doesn't evaluate the second part because OR operators only need one part to be true to evaluate to true, so since the first part "access-token" evaluates to true, the i: 0 and b: 1 are ignored. This may be it, or not, but this is what i figured it out. By the way, many thanks for the free content, helps me a lot! :)

Yuri-
Автор

Sweet video bro 👍 I was searching for paid boot camps in my area but they are like 10K 🙄 Education shouldn't be that expensive. Your video helped me a lot.

vida_en_ruedas
Автор

The best of the best. I can not thank you enough. You helped me improve myself throughout my education and my career, thank you so much and please don't every stop what you're doing on youtube. People need you 😄

aliihsanyesilyer
Автор

At the beginning and I cant wait to see all the material but I already feel there is one crucial chapter missing. "How to find your very first bug and how to report it".
Love the quality of your video though! All from sound quality to graphics

HackingTheBytes
Автор

This course is a valuable and rare gift. profoundly appreciated

Tridib_Tinkel
Автор

I made it to 2:11:05, then I was introduced to natas...now im in a rabbit hole...I will return to the video after I have completed this new challenge.

RustyShackleford-yt
Автор

Great course, can you make a video about a methodology and where to look for bugs? everyone teaches <script>alert(1);</script> but no one teaches you how to approach the target and where to look for bugs, please take that into consideration

khaledmohamed
Автор

Stumbled upon this video and after few minutes instant sub. Epic content have to watch this with proper time

TimoTalksTech
Автор

Brother please speak slowly and try to give more example with definition related to every chapter so that we can understand it in better way, thanks.

SabbirHossain-vuic