YoVDO

Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools

Offered By: NahamSec via YouTube

Tags

Reconnaissance Courses Cybersecurity Courses Ethical Hacking Courses Web Security Courses Information Gathering Courses Vulnerability Assessment Courses Network Scanning Courses

Course Description

Overview

Join a live bug bounty recon session focused on Yahoo, featuring guest @Tomnomnom. Learn essential techniques for reconnaissance, including creating wordlists, using tools like meg and assetfinder, performing directory brute forcing, and leveraging crt.sh. Gain insights into effective recon strategies for bug bounty hunting and improve your skills in identifying potential vulnerabilities. Watch as experienced hackers demonstrate real-world techniques and share valuable tips for successful bug bounty hunting.

Syllabus

09/29/2019 - Live Bug Bounty Recon Session on Yahoo (meg, assetfinder, etc) w/ @Tomnomnom


Taught by

NahamSec

Related Courses

The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Udemy
The Complete Ethical Hacking Course!
Udemy
Ethical Hacking: Footprinting and Reconnaissance
LinkedIn Learning
Applied Ethical Hacking and Rules of Engagement
Udemy
Discovery with ADRecon
Pluralsight