Beyond the Borders of Scope
Offered By: HackerOne via YouTube
Course Description
Overview
Explore advanced bug bounty techniques focusing on out-of-scope asset reconnaissance in this 16-minute conference talk from h@cktivitycon 2020. Learn how to leverage unconventional recon methods to uncover vulnerabilities in core applications without directly hacking out-of-scope assets. Discover Jr0ch17's proven strategies for finding unique bugs, including reflected XSS, RCE, and information disclosure. Gain insights into approaching new targets, identifying site builders, chaining vulnerabilities, and exploiting various platforms like AEM, Slack, and Jenkins. Enhance your bug hunting skills and increase your chances of discovering high-impact, non-duplicate vulnerabilities in bug bounty programs.
Syllabus
Intro
Who am I
Outline
Disclaimer
Approaching a new target
Who built the site
Chaining vulnerabilities
AEM
Target Apps
Slack
Scope
Useruid Leak
Privilege Escalation
Admin Endpoint
Intel Jenkins
Outro
Taught by
HackerOne
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network