🔗Link to the free hands on labs on HackingHub: app.hackinghub.io/hubs/Interactive-sql-injection 🧑🏽💻 Access to my course for 50% off using code 'SQLUA-cam': bugbounty.nahamsec.training/
This was great! I definitely need to revisit this to take the information in better. Definitely like the in depth ground level kind of information in here.
Hey Ben! I clicked this video because it’s your most recent. Tbh I feel like I’m pretty decent at appsec/offensive web security. However I’m pretty new to actually hunting these bounties. I was hoping to convince you to do a short video on exactly how competitive bug bounties are. I’ve found several bugs, but never been the first to report them. I know better than to ask you to give your secrets away. That said, a little advice might go a long way. Should I spend longer searching more deeply for vulns that haven’t been found? Or maybe I should look at bounties with a wider scope? I’m worried I might just be too slow. How fast do I realistically need to be to land a payout? I’m hoping the answer lies in getting better at vetting the bounties I pursue; that seems a far easier goal than simply getting faster overall. Anyway love the channel. Thanks for spending your time to educate us all!
@NahamSec Hacking Hub held a CTF making competition where some challenge would be rewarded. I had submitted a challenge but never heard back. I’m just curious what happened?
🔗Link to the free hands on labs on HackingHub: app.hackinghub.io/hubs/Interactive-sql-injection
🧑🏽💻 Access to my course for 50% off using code 'SQLUA-cam': bugbounty.nahamsec.training/
Yes, this content is great. It's nice to visualize the reason why the symbols and queries cause SQL issues.
Thanks for sharing, love the channel as pentester this is my fav channel
This was great! I definitely need to revisit this to take the information in better. Definitely like the in depth ground level kind of information in here.
Hey Ben! I clicked this video because it’s your most recent. Tbh I feel like I’m pretty decent at appsec/offensive web security. However I’m pretty new to actually hunting these bounties. I was hoping to convince you to do a short video on exactly how competitive bug bounties are.
I’ve found several bugs, but never been the first to report them. I know better than to ask you to give your secrets away. That said, a little advice might go a long way. Should I spend longer searching more deeply for vulns that haven’t been found? Or maybe I should look at bounties with a wider scope? I’m worried I might just be too slow. How fast do I realistically need to be to land a payout? I’m hoping the answer lies in getting better at vetting the bounties I pursue; that seems a far easier goal than simply getting faster overall. Anyway love the channel. Thanks for spending your time to educate us all!
Great Now i am jump these site to doing some crazyyyyyyy Love from India Thanks ! :)
love your content bro
love from Nepal
explain open redirect snd some of the lesser known vulnerabilities which are found on bug bounty
it was so use full big thanks.
@NahamSec Hacking Hub held a CTF making competition where some challenge would be rewarded. I had submitted a challenge but never heard back. I’m just curious what happened?
Thank your for the eye opener
Thank you!
Love you naham
seems like sharing is caring no longer exists,. barely seen any bug bounty writeups lately. Any information shared publicly now is fed to AI scrappers
Very cool
His laptop cover is fire
🎉🎉🎉
❤❤
Before following you it's -> es-Q-el
Now it's -> cqual
Both are valid and correct.
❤🎉