great course, a helpful tip for efficiency in the linux shell is to use 'cntrl a' to go to the beginning of your command, 'cntrl e' goes to the end, 'alt f' goes forward one word and 'alt b' goes backwards one word. much more efficient than using just the arrow keys .. lastly '!!' will run the most recent command again but as sudo.
I saved this video about six months ago but could never go past the first 30-40 mins. This time however, I have sit on it for the last four days keeping some time aside each day going through the video section by section, taking notes, doing those juice shop and portswigger exercises in parallel and watching htb & thm exercises as you were doing, and then doing those python and bash exercises as you were explaining. Finally, I have completed the video few mins ago!!. It's a nice feel now! The knowledge gained in the process is simply invaluable. Thank you lots for such a great video with truly a wealth of information explained in a friendly and engaging way!! 😀
I am only 1 hour in, but this is such a great run down of bug bounty hunting from the ground up. Really appreciate this and all the work that went into making such a drastically long video. One thing that I think would be interesting would be to video a bug bounty attempt from beginning to end of a legitimate successful bug bounty, and then upon bug fix by the company then release the entire course you use to get to the finished stage. Just to see how all of these methods come together into a cohesive successful (or not) hunt.
I'm on my journey to bug bounty and I couldn't be happier with your course. You are a great teacher, easy to understand and very straight forward. Love from Portugal! :D
This is amazing. I ended up coding a python script to substitute burp intruder on the blind condition based sqli exercise and it ended up being so much faster than burp! The part of the video in which you were going to show a faster manual way got cut, so that's how I managed hahah
Thank you, bro No any other platforms are giving this much of information on cybersecurity, but you made us to feel humble on you, thank you so much. Don't feel sad bro, great things take time, not only you have small youtube channel you have the talent and it will generate you income don't feel sad. Thank you once again
Sweet video bro 👍 I was searching for paid boot camps in my area but they are like 10K 🙄 Education shouldn't be that expensive. Your video helped me a lot.
The best of the best. I can not thank you enough. You helped me improve myself throughout my education and my career, thank you so much and please don't every stop what you're doing on youtube. People need you 😄
Dude your so awesome, im suprised you dont go live on twitch. you already have great viewers ready to learn. Seriously this made my OctoberFestive few months. This will definitely aid in HTB BB Course and test to actually get certified, i know its not a requirement, 🤓 but every little bit helps. Thanks again.
@@ryan_phdsechi 👋 , I would like to ask a question : can I still watch this video ? I know nothing about Ethical Hacking, just some html , javascript, python and css . Is this a complete course ? Like it may not teach every topic in detail but does it cover most topic's overview ?
At the beginning and I cant wait to see all the material but I already feel there is one crucial chapter missing. "How to find your very first bug and how to report it". Love the quality of your video though! All from sound quality to graphics
Great course, can you make a video about a methodology and where to look for bugs? everyone teaches alert(1); but no one teaches you how to approach the target and where to look for bugs, please take that into consideration
I think the answer for the question in 8:01:42 could be like, the "access-token" string only, in the object evaluates to true by default, because it is a non empty string, so evaluates to true. The part of i: 0; evaluates to false, because empty integer evaluates to false, like 0 = false. Then the comparison of "access-token" being (true) OR i: 0 being (false) evaluates to true. So when the value of b: 1 replace i: 0, then the comparison only evaluates the first part ("access-token") string as true (because is a non empty string), and doesn't evaluate the second part because OR operators only need one part to be true to evaluate to true, so since the first part "access-token" evaluates to true, the i: 0 and b: 1 are ignored. This may be it, or not, but this is what i figured it out. By the way, many thanks for the free content, helps me a lot! :)
You freaking boss 😎 I just really appreciate your approach to teaching people because you never give the tone “you should already know this but if you don’t …” You’re not arrogant and provide such a wealth of information. Thank you again 🥇🥳 -- Unrelated but as a nerd, who are you cosplaying for Halloween?!?!
Last year i was interested in hacking, so i watched this video without any prior knowledge, now, because of this video, i have a masters in cyber security
CRAZY material. I already do bb work and I''m educated on it, but I'm just going to watch this for fun. Will definitely share this about for others. Kudos to you my man.
That's really a great guide. I'd ask if you could make a video on how to go through all the staff in a schematic way, maybe how to understand if a certain spot (for example a certain get/post request shown on burp) can have a vulnerability for a type of injection rather than for another
Viewer Tip: If he's going too fast, just slow down video playback speed. And to my amazing teacher, @49mins and loving it! I can't say thank you enough, but I hear money talks so I will spend my thanks to you when the bounties start coming in! MTF (&Jesus) BWY 🎉❤😂
This is what I needed to show all the script kiddies in a discord server. This is great stuff!! Thank you keep it up. I’ll spread this video I know it took u more than 11 hours
Thank you for the course !! Great to have that for free. Just one thing that I see on every course speeking about Kali, everyone advises to pay a subscription for a virtual machine which costs about 150-170$ for my part I chose for the same price to buy an old lenovo thinkpad laptop with i5 + 4g of ram that i can up 8gb later Same price and I have it for life and it can potentially be useful for something else later, it's an option that could be interesting to mention too
I believe the reason why the functions that are used in SQL are uppercased is because that is part of the SQL syntax. For example: If you want to select everything from a table; you would do in general SQL. You would do: SELECT * FROM table or something along the lines of that. You see here that the table is lowercased; this is because in the SQL syntax the functions are Uppercased, while the tables are lowercase.
@@JishnuLOL Most administrators write the SQL syntax with upper case letters to determine the difference between the SQL syntax and strings/int. I will admit I didn't know SQL at the time. But what the fuck... this guy says he has a PHd but doesn't act it, lmfao.
Bruh, You have no an idea how i loved the way that you teach us❤ anyways i'm attending it one by one, so i'll comment out when i finish the course 💌, Thank You!
awsome! I jreally like this video and I have to say, I am blown away by how informative and well-structured it is. As someone who is just starting out in the world of bug bounty hunting, I found this video to be incredibly helpful in giving me a solid foundation of knowledge and skills to build upon.
Nice video. Only an hour and half in but you already helped me understand Shodan a little better than my instructor did in my first ethical hacking class. Keep it up man!!!
I never wrote comments, but you deserve more than thanks In Islam we should appreciate the effort you made as the prophet peace be abone hem thought us. the least thing I can do for you is to pray for you. I pray you have a great life.
Thankyuu so muchh for the updated course!! You're a great teacher, your content is the best cybersecurity content available on UA-cam! Keep posting such amazing videos! Much Love ❤
Your course is just awesome Sir. I really appreciate the time and effort you spent to come up with such GREAT COURSE! I actually wanted to ask a question. Do you think it's important to learn about WAF and how to bypass it to discover bugs?, I think most webs use it which makes it harder to discover vulnerabilities..
Hello Boss, I am on Disability and need to come off to make a living, I am learning your first course the best I van, I am not able to support at the current time , But I want to say I will be able to do support you somehow just as soon as I can learn a few courses, get in the field and I got you, Im 48, if you have some ideas how I can get into IT even as a non tech person would be awesome. thank you for helping the less fortunate change our lives. thank you very much.
Only thing this is missing is where to go for bug bounty programs, how to identify a good from bad program, and related... Ive dipped my toe into all of these topics, but when i go to bug crowd or HackerOne I don't even know where to start, so many options! 75 bugs found on this one, 200 people already linked to that one. being so new, and with virtually zero experience i don't know if I'm wasting time on OpenSea bug bounty program for example because i would think the things i could find would already be found by those with the experience. would love a video on these topics and maybe a better outlook on really getting started.
I have a video on looking for good programs: ua-cam.com/video/Gpn2duXLAWA/v-deo.html Next week I will try to do a Q/A and walk through how to identify which ones are best
Great course. Time well spent and good explanations (and entertaining) . Some parts of the later sections before python flew over my head, but I guess that's kind of expected. I'll definitely check other courses and videos from you.
Your videos are very helpful and well explained but can you please create a video about how to write a full report for bug crowd or hacker one of a live bug so that i can have great idea of how to actually present bugs i am sure many other would such problems
How many bugs have you actually found? Like, do you make any real money from it or is it primarily from the youtube channel? Could you kind of put it into context, like how much money/views per month from youtube vs how much money/bugs per month from bounties? and how much time you put into each? Also, how much automation can be utilized to minimize the workload and/or cover more ground on bounties? Is it better to kind of get really automated processes for a few, very common bugs and try to kind of rack up a bunch of low-hanging fruit on multiple bounties or is it kind of better to go more detailed/personal and manually work through a single bounty for longer?
P.S. this is kind of a question because of things I've heard from people like Stoke and that I've met saying they use multiple different devices running automated scripts for common vulns and they make probably half of their money passively like that. I'd love to get in touch and talk to you some more about the trade if you would like to. I'm trying to get my start. I'm fully certified and have a degree but breaking in has been hard and I'm stuck just doing soo many competitions and applications trying to get noticed.. So I'm looking at bug bounty to try and make some money and build up the portfolio
I’d like to know how many total beginners watched this before ever completing a bounty and have since completed a bounty (or more). I’m attempting my first bounty and this video came up in a search but I’m not sure if this directly helped people or not… thoughts?
i mean you can watch it and decide for yourself if it doesnt work then look for another course , thats what you should do while learning it might be helpful to you but no for someone else
I have just started learning cyber anything . Just downloaded Kali on an old phone and am getting my toes wet in python. .. literally at step 0 rn for me. I work in construction and need out. So it's all new & foreign to me.. but bugs seem like such a good way to experiment learn make money and help the world all in one. I may not be able to understand almost anything in this video but I learn quick and it gives me all the keywords I can explore and rabbit hole into later. As well as sort of a road map of what should be first and how to go about organizing my learning curve. Very happy to have this video as I'm sure I'll come back to it (and others like it) many times over the coming year(s)
Hello, I specialize in authorization penetration testing, but I am more involved in cooperating with the police to crack down on gambling websites. I hope you have the opportunity to make some videos about obtaining authorization. Thank you very much
was in college for 2 years for my bachelors in cyber security learned more in this vid than school and my professors thanks ryan !
This is start of my career journey wish me Luck and may luck be with you too
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
its best
@@Abcdefg-q9f
Good luck 😊🎉❤
hows it going
Bro tell me you didn't quit and went into tech sales 😢
Man respect for you. You uploaded a video of 11 hours. You are the real superhero.
Cliked faster than a linux boot
great course, a helpful tip for efficiency in the linux shell is to use 'cntrl a' to go to the beginning of your command, 'cntrl e' goes to the end, 'alt f' goes forward one word and 'alt b' goes backwards one word. much more efficient than using just the arrow keys .. lastly '!!' will run the most recent command again but as sudo.
appreciate it!!
I saved this video about six months ago but could never go past the first 30-40 mins. This time however, I have sit on it for the last four days keeping some time aside each day going through the video section by section, taking notes, doing those juice shop and portswigger exercises in parallel and watching htb & thm exercises as you were doing, and then doing those python and bash exercises as you were explaining. Finally, I have completed the video few mins ago!!. It's a nice feel now!
The knowledge gained in the process is simply invaluable. Thank you lots for such a great video with truly a wealth of information explained in a friendly and engaging way!! 😀
❤
What is your status today in career. How far you achieve.
I am only 1 hour in, but this is such a great run down of bug bounty hunting from the ground up. Really appreciate this and all the work that went into making such a drastically long video. One thing that I think would be interesting would be to video a bug bounty attempt from beginning to end of a legitimate successful bug bounty, and then upon bug fix by the company then release the entire course you use to get to the finished stage. Just to see how all of these methods come together into a cohesive successful (or not) hunt.
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
I'm on my journey to bug bounty and I couldn't be happier with your course. You are a great teacher, easy to understand and very straight forward. Love from Portugal! :D
Tamos juntos 🫡🏴🏴☠️
Want to buildup connection!! I live in Lisbon.
I live in Porto
Como vai isso? Tens capitalizado?
Hey there! How's the journey so far, can you update us? :)
This is amazing. I ended up coding a python script to substitute burp intruder on the blind condition based sqli exercise and it ended up being so much faster than burp! The part of the video in which you were going to show a faster manual way got cut, so that's how I managed hahah
This is a great way to skip paying for burp pro!
Can you share
Thank you, bro
No any other platforms are giving this much of information on cybersecurity, but you made us to feel humble on you, thank you so much. Don't feel sad bro, great things take time, not only you have small youtube channel you have the talent and it will generate you income don't feel sad. Thank you once again
Sweet video bro 👍 I was searching for paid boot camps in my area but they are like 10K 🙄 Education shouldn't be that expensive. Your video helped me a lot.
The best of the best. I can not thank you enough. You helped me improve myself throughout my education and my career, thank you so much and please don't every stop what you're doing on youtube. People need you 😄
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
Dude your so awesome, im suprised you dont go live on twitch. you already have great viewers ready to learn. Seriously this made my OctoberFestive few months. This will definitely aid in HTB BB Course and test to actually get certified, i know its not a requirement, 🤓 but every little bit helps. Thanks again.
I am going to try and do my first live on UA-cam October 9 😳
@@ryan_phdsechi 👋 , I would like to ask a question : can I still watch this video ? I know nothing about Ethical Hacking, just some html , javascript, python and css . Is this a complete course ? Like it may not teach every topic in detail but does it cover most topic's overview ?
@@ryan_phdsec Can't wait bro!!!
At the beginning and I cant wait to see all the material but I already feel there is one crucial chapter missing. "How to find your very first bug and how to report it".
Love the quality of your video though! All from sound quality to graphics
Great course, can you make a video about a methodology and where to look for bugs? everyone teaches alert(1); but no one teaches you how to approach the target and where to look for bugs, please take that into consideration
Noted 😉
I think the answer for the question in 8:01:42 could be like, the "access-token" string only, in the object evaluates to true by default, because it is a non empty string, so evaluates to true. The part of i: 0; evaluates to false, because empty integer evaluates to false, like 0 = false. Then the comparison of "access-token" being (true) OR i: 0 being (false) evaluates to true.
So when the value of b: 1 replace i: 0, then the comparison only evaluates the first part ("access-token") string as true (because is a non empty string), and doesn't evaluate the second part because OR operators only need one part to be true to evaluate to true, so since the first part "access-token" evaluates to true, the i: 0 and b: 1 are ignored. This may be it, or not, but this is what i figured it out. By the way, many thanks for the free content, helps me a lot! :)
You freaking boss 😎 I just really appreciate your approach to teaching people because you never give the tone “you should already know this but if you don’t …”
You’re not arrogant and provide such a wealth of information.
Thank you again 🥇🥳
--
Unrelated but as a nerd, who are you cosplaying for Halloween?!?!
why are you so interested in hacking and what kind of nerd you are ?
Last year i was interested in hacking, so i watched this video without any prior knowledge, now, because of this video, i have a masters in cyber security
You will get to the top, you are the real definition of greatness
CRAZY material. I already do bb work and I''m educated on it, but I'm just going to watch this for fun. Will definitely share this about for others. Kudos to you my man.
Awesome, thank you!
What I need to learn to start bug bounty
bro can you suggest any course for beginner to advanced? please
This course is a valuable and rare gift. profoundly appreciated
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
Stumbled upon this video and after few minutes instant sub. Epic content have to watch this with proper time
you are the best bro, the material you convey is very easy to understand, I am very grateful to you.
Someday your channel would become very popular, given how much efforts and details you put in to your content.
I really appreciate your work
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
Starting this course now. Stopped at Shodan. I hope to gain my skills in ethical hacking. Thanks
This video was so helpful! I've been trying to figure out sort of my methodology when researching, this was exactly what I needed
I made it to 2:11:05, then I was introduced to natas...now im in a rabbit hole...I will return to the video after I have completed this new challenge.
Brother please speak slowly and try to give more example with definition related to every chapter so that we can understand it in better way, thanks.
Thanks so much for taking the time and tirelessly sharing your knowledge with the community Ryan. You're immensely appreciated!!
That's really a great guide. I'd ask if you could make a video on how to go through all the staff in a schematic way, maybe how to understand if a certain spot (for example a certain get/post request shown on burp) can have a vulnerability for a type of injection rather than for another
Viewer Tip: If he's going too fast, just slow down video playback speed.
And to my amazing teacher, @49mins and loving it! I can't say thank you enough, but I hear money talks so I will spend my thanks to you when the bounties start coming in! MTF (&Jesus) BWY 🎉❤😂
This is what I needed to show all the script kiddies in a discord server. This is great stuff!! Thank you keep it up. I’ll spread this video I know it took u more than 11 hours
thanks for this i can't buy merch now but when i find my first bug I will buy it. Love that you do this for the communtity
Meaning u get pay for it ???
How so?
@@Moodboard39 if you do bug bountys you get sometimes a payout
@@vdmoscar5963 oh?? Nice..is hackeron one of them? Or gotta find some company?
@@Moodboard39 yea hackerone. (im a year laye but ok)
Thank you for the course !! Great to have that for free. Just one thing that I see on every course speeking about Kali, everyone advises to pay a subscription for a virtual machine which costs about 150-170$ for my part I chose for the same price to buy an old lenovo thinkpad laptop with i5 + 4g of ram that i can up 8gb later
Same price and I have it for life and it can potentially be useful for something else later, it's an option that could be interesting to mention too
Thank you so much! I’m currently trying to get into bug bounty and this tutorial is perfect! ❤
This is brilliant! Can't thank you enough for this free course. ❤
Wow, I'm super excited to start this course! Thanks for giving people a chance to learn from your experience. 🎉
I believe the reason why the functions that are used in SQL are uppercased is because that is part of the SQL syntax. For example: If you want to select everything from a table; you would do in general SQL. You would do: SELECT * FROM table or something along the lines of that. You see here that the table is lowercased; this is because in the SQL syntax the functions are Uppercased, while the tables are lowercase.
nahh u can use lower cased .i've tried
@@JishnuLOL Most administrators write the SQL syntax with upper case letters to determine the difference between the SQL syntax and strings/int. I will admit I didn't know SQL at the time. But what the fuck... this guy says he has a PHd but doesn't act it, lmfao.
@@SatanicDev The dude made a free 11h video, so how about showing some respect ?
Bruh, You have no an idea how i loved the way that you teach us❤ anyways i'm attending it one by one, so i'll comment out when i finish the course 💌, Thank You!
Thanks sir I am Indian I didn't get best tutorial like yours.
💗🤩 Thanks for help us
You are most welcome
awsome! I jreally like this video and I have to say, I am blown away by how informative and well-structured it is. As someone who is just starting out in the world of bug bounty hunting, I found this video to be incredibly helpful in giving me a solid foundation of knowledge and skills to build upon.
Nice video. Only an hour and half in but you already helped me understand Shodan a little better than my instructor did in my first ethical hacking class. Keep it up man!!!
Wow this is truly amazing. This probably took more time than I can imagine. Thanks for the help
Man hands down in front of you you are one in a Billion ♥
There is a firefox extension called 'foxy proxy' that will make it a lot easier to connect/disconnect to burp.
I used foxyproxy when it first came out and it was buggy and I have never re-installed it
@@ryan_phdsec I think it is not buggy now, and Thanks for the effort you put in your videos.
Thanks .One of the best bug bounty video on UA-cam..
Lots love from India 🇮🇳🇮🇳 god bless you ❤️
I am from India you are excellent dear wonderful .Excellent Thanks for Sharing Knowledge.
might be that the integer will be linking it to row zero in the table that gives access to admin panel
I never wrote comments, but you deserve more than thanks
In Islam we should appreciate the effort you made as the prophet peace be abone hem thought us. the least thing I can do for you is to pray for you.
I pray you have a great life.
Thankyuu so muchh for the updated course!! You're a great teacher, your content is the best cybersecurity content available on UA-cam! Keep posting such amazing videos! Much Love ❤
This man deserves heaven +1
Finally thank you soooo much! Will try to finish it ASAP
Your course is just awesome Sir. I really appreciate the time and effort you spent to come up with such GREAT COURSE! I actually wanted to ask a question. Do you think it's important to learn about WAF and how to bypass it to discover bugs?, I think most webs use it which makes it harder to discover vulnerabilities..
Trust me you will become famous on UA-cam like others cybersecurity channel like David Bombal , Hammond , xss rat ...
One of my best course so far
LOVE THIS! thanks and so appreciate by your dedication onto this!
This is one of the best courses on youtube!
Hello Boss, I am on Disability and need to come off to make a living, I am learning your first course the best I van, I am not able to support at the current time , But I want to say I will be able to do support you somehow just as soon as I can learn a few courses, get in the field and I got you, Im 48, if you have some ideas how I can get into IT even as a non tech person would be awesome. thank you for helping the less fortunate change our lives. thank you very much.
how the progress bro
Hello,
this free course is awesome.
keep up the good work.
Bro you are like a god, in this world where HTB charges 200$+ for courses you are providing it for free
Seriously thank you so much
Only thing this is missing is where to go for bug bounty programs, how to identify a good from bad program, and related... Ive dipped my toe into all of these topics, but when i go to bug crowd or HackerOne I don't even know where to start, so many options! 75 bugs found on this one, 200 people already linked to that one. being so new, and with virtually zero experience i don't know if I'm wasting time on OpenSea bug bounty program for example because i would think the things i could find would already be found by those with the experience. would love a video on these topics and maybe a better outlook on really getting started.
I have a video on looking for good programs: ua-cam.com/video/Gpn2duXLAWA/v-deo.html Next week I will try to do a Q/A and walk through how to identify which ones are best
Do you u get paid? How much ?
I'm new to your channel just the comments show me that I won't be bored
Great course. Time well spent and good explanations (and entertaining) . Some parts of the later sections before python flew over my head, but I guess that's kind of expected. I'll definitely check other courses and videos from you.
Your videos are very helpful and well explained but can you please create a video about how to write a full report for bug crowd or hacker one of a live bug so that i can have great idea of how to actually present bugs i am sure many other would such problems
Nice, i like your way of making notes. Some good tips you gave. Thx fot that.
This huy has been a hell of a teacher
Thank you so much for all you do I'm excited to watch your other videos
☺️ thank you! That's Amazing 🥰
Great video, appreciate you sharing your knowledge!
Thank you very much for this course, you are wonderful 🤩❤
sir you are no less than a god for us noobs
thanks a ton for sharing this
lots of love from india
💌🤟😍😍😍😍😍😍😍😍😍😇🥰
I promise you that I will support you with my 1st bug bounty after I earn ..cause I'm not totally broke 😂
Woooow guys these hacking and bug bounty are great 🎉🎊👍
Thank you so much I glad you made this video.
Glad it was helpful!
sir,
super close to 14k 🥳
All of this course is meat, thank you dude for course. This was what i search for
Very meat
Thanks man from the bottom of my heart
ALLAH BLESS YOU
....💘
Thank you very much, i'm learnt a lot of new things!
Awesome course , thankyou so so so so so much !
Amazing video bro
Thank you so much dude; that course is beneficial
Thank you so much for the valuable course
Do a full indepth tutorial on the Command Injection tool known as Commix.
I love this man's work
Really good course, thank you!
Great video , you’re a great teacher
Sir, you are a life saver for me.❣️
Thank you for sharing ! great information
This is awesome. Thank you!
thaks you so much Sir.....
How many bugs have you actually found? Like, do you make any real money from it or is it primarily from the youtube channel? Could you kind of put it into context, like how much money/views per month from youtube vs how much money/bugs per month from bounties? and how much time you put into each? Also, how much automation can be utilized to minimize the workload and/or cover more ground on bounties? Is it better to kind of get really automated processes for a few, very common bugs and try to kind of rack up a bunch of low-hanging fruit on multiple bounties or is it kind of better to go more detailed/personal and manually work through a single bounty for longer?
P.S. this is kind of a question because of things I've heard from people like Stoke and that I've met saying they use multiple different devices running automated scripts for common vulns and they make probably half of their money passively like that. I'd love to get in touch and talk to you some more about the trade if you would like to. I'm trying to get my start. I'm fully certified and have a degree but breaking in has been hard and I'm stuck just doing soo many competitions and applications trying to get noticed.. So I'm looking at bug bounty to try and make some money and build up the portfolio
You are amazing Mate ! From Australia
I’d like to know how many total beginners watched this before ever completing a bounty and have since completed a bounty (or more). I’m attempting my first bounty and this video came up in a search but I’m not sure if this directly helped people or not… thoughts?
i mean you can watch it and decide for yourself if it doesnt work then look for another course , thats what you should do while learning
it might be helpful to you but no for someone else
I have just started learning cyber anything . Just downloaded Kali on an old phone and am getting my toes wet in python. .. literally at step 0 rn for me. I work in construction and need out. So it's all new & foreign to me.. but bugs seem like such a good way to experiment learn make money and help the world all in one.
I may not be able to understand almost anything in this video but I learn quick and it gives me all the keywords I can explore and rabbit hole into later. As well as sort of a road map of what should be first and how to go about organizing my learning curve.
Very happy to have this video as I'm sure I'll come back to it (and others like it) many times over the coming year(s)
thanks a lot brother
Hello, I specialize in authorization penetration testing, but I am more involved in cooperating with the police to crack down on gambling websites. I hope you have the opportunity to make some videos about obtaining authorization. Thank you very much
Get website and server permissions
While it's ok to know how to half do this stuff, I think it's still important to learn how to report a vulnerability.
Dude I have needed this sooooooo bad
Thank you. I just started to watch. First question, why not WSL2? Btw I like wm ware and Wsl.