Hacksplained
Hacksplained
  • 126
  • 888 116
Intigriti Out-Of-Scope Days 2022 - Mallorca 🇪🇸
When an entire company goes out-of-scope, it's the Intigriti OOS DAYS 🇪🇸
After our successful Series-B funding round, it was time to pack up the entire team an go ... to SPAIN! Together with 80 colleagues we flew over to the beautiful island of Mallorca and landed in a nice hotel in Magaluf. Our days were packed with good food, workshops, crazy team events and even bigger parties!
Come and join Intigriti if you also wanna be part of our OOS days in the future 😇
📃 This video is part of the HACKING ESCAPES playlist (ua-cam.com/video/1-Gl5yTrXKo/v-deo.html).
🧘 Take this journey together with me. Calm down, stop hacking for just a bit and recharge yourself.
💡 If you have any questions or want to request a new video about a special topic, feel free to leave me a comment. You can also contact me on all of my social medias below.
💖 I need your help. Subscribe to this channel, link and retweet my videos and share them with your friends. This going to help make this project more sustainable in the long-run.
💙 Last but not least: Subscribe to my Twitter channels hacksplained & PascalSec, and support me on Patreon www.patreon.com/hacksplained or buymeacoffee.com/hacksplained
Переглядів: 1 852

Відео

Hacking Escape #6 - Island, Volcano & Lighthouse 🇪🇸
Переглядів 5152 роки тому
Island, Volcano & Lighthouse - Viva la España 🇪🇸 Having studied together in 2016 in Malaga, we have not had the chance since to go on a boys trip. Haroun, Dino and I set out to explore the volcanic island of Gran Canaria (back to the roots travelling to Spain). Timeline: 00:00 Las Palmas de Gran Canaria 02:05 Dunas de Maspalomas 03:10 Puerto Morgan 04:05 El Roque Nublo 05:33 Arucas 05:51 Gáldar...
Bug Bounty Live Recon - Linked / JS Discovery!
Переглядів 4 тис.2 роки тому
Bug Bounty Live Hunting Part 2 - In episode 2, we are going to extract further subdomains from links and from discovering JS files🔥 Timeline: 00:00 Intro & Disclaimer 01:02 Burp Suite Crawling 02:57 Hakrawler 04:22 Privado VPN 05:15 Gospider 06:36 Subdomainizer 07:44 Outro Big thanks to the sponsor of this video: Privado VPN Get 69% off their regular prize with my link: privadovpn.com/limitedof...
Bug Bounty Live Recon - Grabbing Domains!
Переглядів 5 тис.2 роки тому
Bug Bounty Live Hunting Part 1 - In this first episode, we are going to look into grabbing root domains of a bug bounty target🔥 Timeline: 00:00 Intro & Disclaimer 01:09 ipinfo.io sponsoring 02:05 Study BB Program 02:20 Crunchbase.com 03:15 BGP Toolkit 04:24 Metabigor 05:11 Amass 06:03 Whoxy.com 07:04 Domlink.py 07:48 Builtwith.com 08:53 Shodan.io 09:50 Outro Big thanks to the sponsor of this vi...
2nd German Live Hacking Event (#KAEFERJAEGER)!
Переглядів 8473 роки тому
2nd German Live Hacking Event (#KAEFERJAEGER)!
Hacking Escape #5 - Cliff Walks, Pubs & Guinness 🇮🇪
Переглядів 5213 роки тому
Hacking Escape #5 - Cliff Walks, Pubs & Guinness 🇮🇪
OWASP TOP 10 - 2021 Edition
Переглядів 29 тис.3 роки тому
OWASP TOP 10 - 2021 Edition
Staying Up-To-Date In CYBERSECURITY!
Переглядів 2,5 тис.3 роки тому
Staying Up-To-Date In CYBERSECURITY!
I QUIT MY JOB 🤯 (And you will benefit!)
Переглядів 1,7 тис.3 роки тому
I QUIT MY JOB 🤯 (And you will benefit!)
Finding Secrets in Public Github Repositories (the SAST way)
Переглядів 9943 роки тому
Finding Secrets in Public Github Repositories (the SAST way)
Finding Vulns in Public Github Repositories (the SAST way)
Переглядів 1,3 тис.3 роки тому
Finding Vulns in Public Github Repositories (the SAST way)
Finding vulnerabilities with automation (the SAST way)
Переглядів 6 тис.3 роки тому
Finding vulnerabilities with automation (the SAST way)
Burp Suite Professional Features For Free (Pimp your Community Edition)
Переглядів 14 тис.3 роки тому
Burp Suite Professional Features For Free (Pimp your Community Edition)
Python Dependency Confusion (Demystified)
Переглядів 1,6 тис.3 роки тому
Python Dependency Confusion (Demystified)
★★★★★ Extra Language (Broken Anti Automation)
Переглядів 5 тис.3 роки тому
★★★★★ Extra Language (Broken Anti Automation)
★★★★★ Change Benders Password (Broken Authentication)
Переглядів 9 тис.3 роки тому
★★★★★ Change Benders Password (Broken Authentication)
@VickieLiDev and I chat about Bug Bounties, Infosec, Jobs and More
Переглядів 1,3 тис.3 роки тому
@VickieLiDev and I chat about Bug Bounties, Infosec, Jobs and More
Pentest Interview Questions (Junior / Senior / Principal)
Переглядів 28 тис.3 роки тому
Pentest Interview Questions (Junior / Senior / Principal)
★★★★ NoSql Manipulation (Injection)
Переглядів 8 тис.3 роки тому
★★★★ NoSql Manipulation (Injection)
★★★★ Nested Easter Egg (Cryptographic Issues)
Переглядів 6 тис.3 роки тому
★★★★ Nested Easter Egg (Cryptographic Issues)
OSWE Review - Tips & Tricks (Offensive Security Web Expert)
Переглядів 20 тис.4 роки тому
OSWE Review - Tips & Tricks (Offensive Security Web Expert)
2020: A Year in Review (Hacksplained Edition)
Переглядів 2134 роки тому
2020: A Year in Review (Hacksplained Edition)
Merry Christmas (Give-Away)
Переглядів 4884 роки тому
Merry Christmas (Give-Away)
The Motivational Advice You Never Asked For (Bug Bounty Style)
Переглядів 2,7 тис.4 роки тому
The Motivational Advice You Never Asked For (Bug Bounty Style)
Faster Bounty Rewards With 5 Easy Tips
Переглядів 1,7 тис.4 роки тому
Faster Bounty Rewards With 5 Easy Tips
★★★★ Misplaced Signature File (Sensitive Data Exposure)
Переглядів 3,4 тис.4 роки тому
★★★★ Misplaced Signature File (Sensitive Data Exposure)
★★★★ Login Bjoern (Broken Authentication)
Переглядів 7 тис.4 роки тому
★★★★ Login Bjoern (Broken Authentication)
★★★★ Legacy Typosquatting (Vulnerable Components)
Переглядів 4,7 тис.4 роки тому
★★★★ Legacy Typosquatting (Vulnerable Components)
First German Live Hacking Event (Kaeferjaeger Style)
Переглядів 1,2 тис.4 роки тому
First German Live Hacking Event (Kaeferjaeger Style)
★★★★ GDPR Data Theft (Sensitive Data Exposure)
Переглядів 5 тис.4 роки тому
★★★★ GDPR Data Theft (Sensitive Data Exposure)

КОМЕНТАРІ

  • @ihteshamullah3131
    @ihteshamullah3131 4 дні тому

    Amazing 🎉

  • @PinkDraconian
    @PinkDraconian 25 днів тому

    Reached this video whilst doing some research for a training I'm creating and accidentally clicking a link 😉 How are you doing Pascal?

    • @Hacksplained
      @Hacksplained 21 день тому

      hahaha no way :D Doing great! Love that these videos are still popping up! Hope you are doing well PD :D

  • @codeRiot66
    @codeRiot66 Місяць тому

    this is what've been looking for! thanks!!

  • @Miamia-g6e
    @Miamia-g6e Місяць тому

    i kinda didnt understend the purpouse of this <<attack>> could u please explain >

  • @quynhhuongvu2948
    @quynhhuongvu2948 Місяць тому

    Give you 10000 hearts I have done it after 10000 tries

  • @Manojkumar-l4p4s
    @Manojkumar-l4p4s Місяць тому

    Bro i want your help please help me bro

  • @Piratagorranegra
    @Piratagorranegra Місяць тому

    Cool

  • @soumyajitnandy-m2w
    @soumyajitnandy-m2w Місяць тому

    Sir I have a question about SQL injection can you recommend some SQL injection querry which are used mostly

  • @vincentchimaobi4461
    @vincentchimaobi4461 2 місяці тому

    I had never understood Burpsuite until I followed your guild. I was not following Cyber Mentor's Web App series due to my inability to set up BurpSuite. Thank You Very Much. Please try to cover HTTP methods for the Burp Suite Application.

  • @mnoga
    @mnoga 3 місяці тому

    Hey, I know this is a few years old now but I wanted to say thank you, this is a great guide as I'm getting started with the course. Once question, you keep mentioning a PDF Guide, is this a PDF from OffSec that you get as part of the course or something else? I'm taking the course as part of a subscription that my company has with OffSec and there is no PDFs available to download so I'm hoping this is a guide from someone else.

  • @RL-cw9uh
    @RL-cw9uh 4 місяці тому

    Fantastic walkthrough and explanation

  • @yashkumar-ft8mg
    @yashkumar-ft8mg 5 місяців тому

    I didn't know Magnus Carlsen is into Cyber Security

  • @pavlisharma6454
    @pavlisharma6454 5 місяців тому

    hey can you please tell me about any practicals an interviewer can ask for a junior security tester as a fresher

  • @naiarademellomartins3660
    @naiarademellomartins3660 5 місяців тому

    WHERE CAN I FIND THIS BURP?

  • @hichemsavastano4430
    @hichemsavastano4430 6 місяців тому

    Hello 🙂 i have long time and i was searching for tool or something like i give it the source code and she find the mistakes inside and vulnerability's i think that help me on my journey and im new in bug hunting 😅

  • @JeanPierre-i8l
    @JeanPierre-i8l 7 місяців тому

    Lol i can see your basket with an apple juice

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    Thanks for all juice-shop run👍 greetings from Türkiye 😁

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    eyw

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    ilqinç

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    eyw

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    😮

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    vayqw

  • @TheMilesPrower
    @TheMilesPrower 7 місяців тому

    You can figure out it use a base64 crypto because when you intercept a login callback we can see a bunch of SHA-1 and base64 encrypted tokens in the session loggin. Don't know why they do not accept SHA-1 as an excuse though.

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    eyw

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    ha

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    eyw

  • @aliuzun8885
    @aliuzun8885 7 місяців тому

    6:10 inş knk

  • @kalendra.ethicalhacker
    @kalendra.ethicalhacker 8 місяців тому

    I applied for a job as penetration testing , for my online interview , I want to show by bug bounty hunting skills , my hall of fames , how I do testing by screen sharing , is that helpful

  • @JoudNovember
    @JoudNovember 8 місяців тому

    I dont have add to basket button

  • @ЮрійМинаш
    @ЮрійМинаш 8 місяців тому

    I Waited for this video

  • @mangwibenita3138
    @mangwibenita3138 9 місяців тому

    How do I link juice box to burp?

  • @MistaYo9221
    @MistaYo9221 9 місяців тому

    Hi @Hacksplained. How do you reset the challenges? Every time i open a new juiceshop page it says i have completed 57% of the challenges

  • @AbdulHannanEngg
    @AbdulHannanEngg 9 місяців тому

    how to get jpeg file/code u hve pasted

  • @joesiu4972
    @joesiu4972 10 місяців тому

    very good bro

  • @legio-nyc
    @legio-nyc 10 місяців тому

    Hacksplained is the best teacher! Thanks for helping us noobs get through a lot of complicated stuff.

  • @ToqeerMalik01
    @ToqeerMalik01 10 місяців тому

    Big love from Pakistan 🇵🇰✅❤

  • @mvs9549
    @mvs9549 11 місяців тому

    how do u know which cipher encryption to use??

  • @dudetime3720
    @dudetime3720 11 місяців тому

    I came here because I’m on OWASP Juice Shop for the first time. I was scrolling down my HTTP History on Burp and I got the “solved challenge” banner for “Manipulate Basket” and all I did was scroll down burp. I didn’t even make an account on Juice shop. I know hacks, exploits, and vulnerabilities can be found by accident, but like what did I do? 💀

  • @tauseef3270
    @tauseef3270 Рік тому

    thanks man! really helped a lot

  • @LordAikay
    @LordAikay Рік тому

    All right I’m thanks for your video I really loved it so am I was wondering can I get your email address I really want to talk to you about something

  • @flookerthings
    @flookerthings Рік тому

    i cant find the bid

  • @edclam
    @edclam Рік тому

    Alas, it's free no more, a payment method must be added. Here's what I was shown just now: 'Basic dynos ~$0.010/hour'. Personally I don't mind making reasonable payments. It's the cancellation or forget to cancel and using the services inadvertently that can be concerning. So if that's fine with you do enjoy it! Plus, I already have a few deployments made on Kali Linux so don't really need the Heroku vesion. Anyway, happy hacking (legally)!

  • @guriktala3508
    @guriktala3508 Рік тому

    🫡

  • @anonyone8834
    @anonyone8834 Рік тому

    I DID IT in browser only, just use the endpoint of feedbacks

  • @rajendr7235
    @rajendr7235 Рік тому

    Hii

  • @rajendr7235
    @rajendr7235 Рік тому

    ❤❤❤

  • @ritubanerjee5061
    @ritubanerjee5061 Рік тому

    This is truly a brilliant solution! I haven't downloaded the script, but you can display a suitable message and terminate the loop as soon as you get a 200 response (instead of 401) from the server.

  • @h0udini420
    @h0udini420 Рік тому

    Great stuff! could you please make demos for maven and rubygems as well?

  • @sethwikle8927
    @sethwikle8927 Рік тому

    why is this video age restricted lmao

  • @vardanverma1585
    @vardanverma1585 Рік тому

    why cant i edit in burp raw req part