Це відео не доступне.
Перепрошуємо.

Bug Bounty: Subdomain Takeover Vulnerability | 2024

Поділитися
Вставка
  • Опубліковано 12 тра 2024
  • Welcome to another cybersecurity exploration! Today, we're diving into the intriguing world of Subdomain Takeover Vulnerability. Imagine this: you're cruising through the web, but lurking beneath the surface lies a potential threat. Subdomain Takeover occurs when a third party seizes control of a subdomain, exploiting it for malicious deeds. It's like someone sneaking into your backyard and setting up camp without your knowledge! Join us as we uncover how this vulnerability works and how to safeguard against it. Stay tuned for insights that will keep you one step ahead in the digital realm!
    Website: bepractical.tech
    Telegram: telegram.me/be...
    Previous Video: • IoT PenTesting: How I ...
    The Art Of Web Reconnaissance:
    www.udemy.com/...
    Hacking Windows with Python from Scratch: www.udemy.com/...
    The Ultimate Guide to Hunt Account Takeover:
    www.udemy.com/...

КОМЕНТАРІ • 37

  • @BePracticalTech
    @BePracticalTech  3 місяці тому +4

    Here's a challenge for you! Can you takeover this subdomain: takeneover.bepractical.tech? Once you took the subdomain, make sure to post about it on linkedin and mention my linkedin profile so that i can see it!
    LinkedIn Profile: www.linkedin.com/in/faiyaz-ahmad-64457520b/

  • @user-ik5xi5yv9y
    @user-ik5xi5yv9y Місяць тому

    so clear and concise. Thankyou

  • @ZaraRashidKhan
    @ZaraRashidKhan 3 місяці тому +1

    Your videos are really informative🙌🏻

  • @aatankbadboy3941
    @aatankbadboy3941 3 місяці тому +3

    Bro are you aware about the information disclosure bug in which .....internal backlog and dashboard items publicly disclosed on Jira without logging in

    • @BePracticalTech
      @BePracticalTech  3 місяці тому +2

      Yes, I am thinking of creating a video on it too

  • @saleemahmed8302
    @saleemahmed8302 3 місяці тому

    Fabulously explained. Excellent

  • @dhruvdadarwala2045
    @dhruvdadarwala2045 3 місяці тому +1

    very smoothly explanation make some video on how beginner find target for bug hunting

  • @SecureByBhavesh
    @SecureByBhavesh 3 місяці тому

    Very Informative!

  • @gg-mr4qr
    @gg-mr4qr 3 місяці тому

    love you sir...! waiting for your videos ..... sir please make a video about php vulnerability exploit in WAN.

  • @ArunR.C
    @ArunR.C 3 місяці тому

    Really useful your videos ❤

  • @abduls4479
    @abduls4479 3 місяці тому

    Great video, all the best bro

  • @TheKiddie1-it9dl
    @TheKiddie1-it9dl 22 дні тому

    what if they pointed to an an IP

  • @uttarkhandcooltech1237
    @uttarkhandcooltech1237 3 місяці тому +4

    I am first 🥇 can you provide me your window wallpaper 💗 please

    • @gg-mr4qr
      @gg-mr4qr 3 місяці тому +2

      sir's window wallpaper is too cool, right!!!

  • @lostInSocialMedia.
    @lostInSocialMedia. 3 місяці тому

    Which virtual debit card you use for international transactions for this purpose

    • @BePracticalTech
      @BePracticalTech  3 місяці тому

      I used the virtual card from airtel thanks app

  • @Mrkk-iy8jk
    @Mrkk-iy8jk Місяць тому

    Your videos are simply awesome bruh!!

  • @Khalid-bm4fw
    @Khalid-bm4fw 3 місяці тому

    Why you don't use dig cammand to get cname of the subdomain?

    • @BePracticalTech
      @BePracticalTech  3 місяці тому

      To answer this question, Please try to run dig on takenover.bepractical.tech and let me know if you are seeing the CNAME record. Thanks

  • @CyberWings100
    @CyberWings100 3 місяці тому

    Nice

  • @hackingdemon0764
    @hackingdemon0764 3 місяці тому

    is that free or paid to create a s3 bucket in aws

  • @milan9093
    @milan9093 3 місяці тому

    Nice one bro. Priority? P2?

    • @BePracticalTech
      @BePracticalTech  3 місяці тому +1

      Depends on the impact. Generally it is p2-p5

  • @aatankbadboy3941
    @aatankbadboy3941 3 місяці тому

  • @parvejniaj8427
    @parvejniaj8427 3 місяці тому

    🇧🇩❤️