YoVDO

Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools

Offered By: NahamSec via YouTube

Tags

Reconnaissance Courses Cybersecurity Courses Ethical Hacking Courses Web Security Courses Information Gathering Courses Vulnerability Assessment Courses Network Scanning Courses

Course Description

Overview

Join a live bug bounty recon session focused on Yahoo, featuring guest @Tomnomnom. Learn essential techniques for reconnaissance, including creating wordlists, using tools like meg and assetfinder, performing directory brute forcing, and leveraging crt.sh. Gain insights into effective recon strategies for bug bounty hunting and improve your skills in identifying potential vulnerabilities. Watch as experienced hackers demonstrate real-world techniques and share valuable tips for successful bug bounty hunting.

Syllabus

09/29/2019 - Live Bug Bounty Recon Session on Yahoo (meg, assetfinder, etc) w/ @Tomnomnom


Taught by

NahamSec

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Client-Server Communication
Google via Udacity
HTTP & Web Servers
Udacity
Network Security
Georgia Institute of Technology via Udacity
Web Security Fundamentals
KU Leuven University via edX