Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools
Offered By: NahamSec via YouTube
Course Description
Overview
Join a live bug bounty recon session focused on Yahoo, featuring guest @Tomnomnom. Learn essential techniques for reconnaissance, including creating wordlists, using tools like meg and assetfinder, performing directory brute forcing, and leveraging crt.sh. Gain insights into effective recon strategies for bug bounty hunting and improve your skills in identifying potential vulnerabilities. Watch as experienced hackers demonstrate real-world techniques and share valuable tips for successful bug bounty hunting.
Syllabus
09/29/2019 - Live Bug Bounty Recon Session on Yahoo (meg, assetfinder, etc) w/ @Tomnomnom
Taught by
NahamSec
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX