Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools
Offered By: NahamSec via YouTube
Course Description
Overview
Join a live bug bounty recon session focused on Yahoo, featuring guest @Tomnomnom. Learn essential techniques for reconnaissance, including creating wordlists, using tools like meg and assetfinder, performing directory brute forcing, and leveraging crt.sh. Gain insights into effective recon strategies for bug bounty hunting and improve your skills in identifying potential vulnerabilities. Watch as experienced hackers demonstrate real-world techniques and share valuable tips for successful bug bounty hunting.
Syllabus
09/29/2019 - Live Bug Bounty Recon Session on Yahoo (meg, assetfinder, etc) w/ @Tomnomnom
Taught by
NahamSec
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network