YoVDO

Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools

Offered By: NahamSec via YouTube

Tags

Reconnaissance Courses Cybersecurity Courses Ethical Hacking Courses Web Security Courses Information Gathering Courses Vulnerability Assessment Courses Network Scanning Courses

Course Description

Overview

Join a live bug bounty recon session focused on Yahoo, featuring guest @Tomnomnom. Learn essential techniques for reconnaissance, including creating wordlists, using tools like meg and assetfinder, performing directory brute forcing, and leveraging crt.sh. Gain insights into effective recon strategies for bug bounty hunting and improve your skills in identifying potential vulnerabilities. Watch as experienced hackers demonstrate real-world techniques and share valuable tips for successful bug bounty hunting.

Syllabus

09/29/2019 - Live Bug Bounty Recon Session on Yahoo (meg, assetfinder, etc) w/ @Tomnomnom


Taught by

NahamSec

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX