great course, a helpful tip for efficiency in the linux shell is to use 'cntrl a' to go to the beginning of your command, 'cntrl e' goes to the end, 'alt f' goes forward one word and 'alt b' goes backwards one word. much more efficient than using just the arrow keys .. lastly '!!' will run the most recent command again but as sudo.
I'm on my journey to bug bounty and I couldn't be happier with your course. You are a great teacher, easy to understand and very straight forward. Love from Portugal! :D
Last year i was interested in hacking, so i watched this video without any prior knowledge, now, because of this video, i have a masters in cyber security
I am only 1 hour in, but this is such a great run down of bug bounty hunting from the ground up. Really appreciate this and all the work that went into making such a drastically long video. One thing that I think would be interesting would be to video a bug bounty attempt from beginning to end of a legitimate successful bug bounty, and then upon bug fix by the company then release the entire course you use to get to the finished stage. Just to see how all of these methods come together into a cohesive successful (or not) hunt.
I saved this video about six months ago but could never go past the first 30-40 mins. This time however, I have sit on it for the last four days keeping some time aside each day going through the video section by section, taking notes, doing those juice shop and portswigger exercises in parallel and watching htb & thm exercises as you were doing, and then doing those python and bash exercises as you were explaining. Finally, I have completed the video few mins ago!!. It's a nice feel now! The knowledge gained in the process is simply invaluable. Thank you lots for such a great video with truly a wealth of information explained in a friendly and engaging way!! 😀
This is amazing. I ended up coding a python script to substitute burp intruder on the blind condition based sqli exercise and it ended up being so much faster than burp! The part of the video in which you were going to show a faster manual way got cut, so that's how I managed hahah
Thank you, bro No any other platforms are giving this much of information on cybersecurity, but you made us to feel humble on you, thank you so much. Don't feel sad bro, great things take time, not only you have small youtube channel you have the talent and it will generate you income don't feel sad. Thank you once again
Sweet video bro 👍 I was searching for paid boot camps in my area but they are like 10K 🙄 Education shouldn't be that expensive. Your video helped me a lot.
At the beginning and I cant wait to see all the material but I already feel there is one crucial chapter missing. "How to find your very first bug and how to report it". Love the quality of your video though! All from sound quality to graphics
The best of the best. I can not thank you enough. You helped me improve myself throughout my education and my career, thank you so much and please don't every stop what you're doing on youtube. People need you 😄
I think the answer for the question in 8:01:42 could be like, the "access-token" string only, in the object evaluates to true by default, because it is a non empty string, so evaluates to true. The part of i: 0; evaluates to false, because empty integer evaluates to false, like 0 = false. Then the comparison of "access-token" being (true) OR i: 0 being (false) evaluates to true. So when the value of b: 1 replace i: 0, then the comparison only evaluates the first part ("access-token") string as true (because is a non empty string), and doesn't evaluate the second part because OR operators only need one part to be true to evaluate to true, so since the first part "access-token" evaluates to true, the i: 0 and b: 1 are ignored. This may be it, or not, but this is what i figured it out. By the way, many thanks for the free content, helps me a lot! :)
Viewer Tip: If he's going too fast, just slow down video playback speed. And to my amazing teacher, @49mins and loving it! I can't say thank you enough, but I hear money talks so I will spend my thanks to you when the bounties start coming in! MTF (&Jesus) BWY 🎉❤😂
Great course, can you make a video about a methodology and where to look for bugs? everyone teaches alert(1); but no one teaches you how to approach the target and where to look for bugs, please take that into consideration
Dude your so awesome, im suprised you dont go live on twitch. you already have great viewers ready to learn. Seriously this made my OctoberFestive few months. This will definitely aid in HTB BB Course and test to actually get certified, i know its not a requirement, 🤓 but every little bit helps. Thanks again.
@@ryan_phdsechi 👋 , I would like to ask a question : can I still watch this video ? I know nothing about Ethical Hacking, just some html , javascript, python and css . Is this a complete course ? Like it may not teach every topic in detail but does it cover most topic's overview ?
This is what I needed to show all the script kiddies in a discord server. This is great stuff!! Thank you keep it up. I’ll spread this video I know it took u more than 11 hours
You freaking boss 😎 I just really appreciate your approach to teaching people because you never give the tone “you should already know this but if you don’t …” You’re not arrogant and provide such a wealth of information. Thank you again 🥇🥳 -- Unrelated but as a nerd, who are you cosplaying for Halloween?!?!
CRAZY material. I already do bb work and I''m educated on it, but I'm just going to watch this for fun. Will definitely share this about for others. Kudos to you my man.
awsome! I jreally like this video and I have to say, I am blown away by how informative and well-structured it is. As someone who is just starting out in the world of bug bounty hunting, I found this video to be incredibly helpful in giving me a solid foundation of knowledge and skills to build upon.
Nice video. Only an hour and half in but you already helped me understand Shodan a little better than my instructor did in my first ethical hacking class. Keep it up man!!!
That's really a great guide. I'd ask if you could make a video on how to go through all the staff in a schematic way, maybe how to understand if a certain spot (for example a certain get/post request shown on burp) can have a vulnerability for a type of injection rather than for another
Bruh, You have no an idea how i loved the way that you teach us❤ anyways i'm attending it one by one, so i'll comment out when i finish the course 💌, Thank You!
Thank you for the course !! Great to have that for free. Just one thing that I see on every course speeking about Kali, everyone advises to pay a subscription for a virtual machine which costs about 150-170$ for my part I chose for the same price to buy an old lenovo thinkpad laptop with i5 + 4g of ram that i can up 8gb later Same price and I have it for life and it can potentially be useful for something else later, it's an option that could be interesting to mention too
Thankyuu so muchh for the updated course!! You're a great teacher, your content is the best cybersecurity content available on UA-cam! Keep posting such amazing videos! Much Love ❤
I never wrote comments, but you deserve more than thanks In Islam we should appreciate the effort you made as the prophet peace be abone hem thought us. the least thing I can do for you is to pray for you. I pray you have a great life.
Great course. Time well spent and good explanations (and entertaining) . Some parts of the later sections before python flew over my head, but I guess that's kind of expected. I'll definitely check other courses and videos from you.
Your course is just awesome Sir. I really appreciate the time and effort you spent to come up with such GREAT COURSE! I actually wanted to ask a question. Do you think it's important to learn about WAF and how to bypass it to discover bugs?, I think most webs use it which makes it harder to discover vulnerabilities..
Your videos are very helpful and well explained but can you please create a video about how to write a full report for bug crowd or hacker one of a live bug so that i can have great idea of how to actually present bugs i am sure many other would such problems
I believe the reason why the functions that are used in SQL are uppercased is because that is part of the SQL syntax. For example: If you want to select everything from a table; you would do in general SQL. You would do: SELECT * FROM table or something along the lines of that. You see here that the table is lowercased; this is because in the SQL syntax the functions are Uppercased, while the tables are lowercase.
@@JishnuLOL Most administrators write the SQL syntax with upper case letters to determine the difference between the SQL syntax and strings/int. I will admit I didn't know SQL at the time. But what the fuck... this guy says he has a PHd but doesn't act it, lmfao.
Hello Boss, I am on Disability and need to come off to make a living, I am learning your first course the best I van, I am not able to support at the current time , But I want to say I will be able to do support you somehow just as soon as I can learn a few courses, get in the field and I got you, Im 48, if you have some ideas how I can get into IT even as a non tech person would be awesome. thank you for helping the less fortunate change our lives. thank you very much.
was in college for 2 years for my bachelors in cyber security learned more in this vid than school and my professors thanks ryan !
Man respect for you. You uploaded a video of 11 hours. You are the real superhero.
This is start of my career journey wish me Luck and may luck be with you too
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
its best
@@MK_inamdar
Good luck 😊🎉❤
hows it going
Bro tell me you didn't quit and went into tech sales 😢
great course, a helpful tip for efficiency in the linux shell is to use 'cntrl a' to go to the beginning of your command, 'cntrl e' goes to the end, 'alt f' goes forward one word and 'alt b' goes backwards one word. much more efficient than using just the arrow keys .. lastly '!!' will run the most recent command again but as sudo.
appreciate it!!
Thanks man! I was using the arrow keys for years without knowing 😢
I'm on my journey to bug bounty and I couldn't be happier with your course. You are a great teacher, easy to understand and very straight forward. Love from Portugal! :D
Tamos juntos 🫡🏴🏴☠️
Want to buildup connection!! I live in Lisbon.
I live in Porto
Como vai isso? Tens capitalizado?
Hey there! How's the journey so far, can you update us? :)
Last year i was interested in hacking, so i watched this video without any prior knowledge, now, because of this video, i have a masters in cyber security
I am only 1 hour in, but this is such a great run down of bug bounty hunting from the ground up. Really appreciate this and all the work that went into making such a drastically long video. One thing that I think would be interesting would be to video a bug bounty attempt from beginning to end of a legitimate successful bug bounty, and then upon bug fix by the company then release the entire course you use to get to the finished stage. Just to see how all of these methods come together into a cohesive successful (or not) hunt.
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
@@MK_inamdar r u ?
I saved this video about six months ago but could never go past the first 30-40 mins. This time however, I have sit on it for the last four days keeping some time aside each day going through the video section by section, taking notes, doing those juice shop and portswigger exercises in parallel and watching htb & thm exercises as you were doing, and then doing those python and bash exercises as you were explaining. Finally, I have completed the video few mins ago!!. It's a nice feel now!
The knowledge gained in the process is simply invaluable. Thank you lots for such a great video with truly a wealth of information explained in a friendly and engaging way!! 😀
❤
What is your status today in career. How far you achieve.
This is amazing. I ended up coding a python script to substitute burp intruder on the blind condition based sqli exercise and it ended up being so much faster than burp! The part of the video in which you were going to show a faster manual way got cut, so that's how I managed hahah
This is a great way to skip paying for burp pro!
Can you share
You will get to the top, you are the real definition of greatness
Cliked faster than a linux boot
Thank you, bro
No any other platforms are giving this much of information on cybersecurity, but you made us to feel humble on you, thank you so much. Don't feel sad bro, great things take time, not only you have small youtube channel you have the talent and it will generate you income don't feel sad. Thank you once again
Sweet video bro 👍 I was searching for paid boot camps in my area but they are like 10K 🙄 Education shouldn't be that expensive. Your video helped me a lot.
At the beginning and I cant wait to see all the material but I already feel there is one crucial chapter missing. "How to find your very first bug and how to report it".
Love the quality of your video though! All from sound quality to graphics
The best of the best. I can not thank you enough. You helped me improve myself throughout my education and my career, thank you so much and please don't every stop what you're doing on youtube. People need you 😄
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
Stumbled upon this video and after few minutes instant sub. Epic content have to watch this with proper time
I made it to 2:11:05, then I was introduced to natas...now im in a rabbit hole...I will return to the video after I have completed this new challenge.
I think the answer for the question in 8:01:42 could be like, the "access-token" string only, in the object evaluates to true by default, because it is a non empty string, so evaluates to true. The part of i: 0; evaluates to false, because empty integer evaluates to false, like 0 = false. Then the comparison of "access-token" being (true) OR i: 0 being (false) evaluates to true.
So when the value of b: 1 replace i: 0, then the comparison only evaluates the first part ("access-token") string as true (because is a non empty string), and doesn't evaluate the second part because OR operators only need one part to be true to evaluate to true, so since the first part "access-token" evaluates to true, the i: 0 and b: 1 are ignored. This may be it, or not, but this is what i figured it out. By the way, many thanks for the free content, helps me a lot! :)
This course is a valuable and rare gift. profoundly appreciated
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
Viewer Tip: If he's going too fast, just slow down video playback speed.
And to my amazing teacher, @49mins and loving it! I can't say thank you enough, but I hear money talks so I will spend my thanks to you when the bounties start coming in! MTF (&Jesus) BWY 🎉❤😂
This video was so helpful! I've been trying to figure out sort of my methodology when researching, this was exactly what I needed
Starting this course now. Stopped at Shodan. I hope to gain my skills in ethical hacking. Thanks
Great course, can you make a video about a methodology and where to look for bugs? everyone teaches alert(1); but no one teaches you how to approach the target and where to look for bugs, please take that into consideration
Noted 😉
Wow, I'm super excited to start this course! Thanks for giving people a chance to learn from your experience. 🎉
Someday your channel would become very popular, given how much efforts and details you put in to your content.
I really appreciate your work
Since this been a year I want to ask how this field now and what stage r u in now ? I just wanted to start in
Dude your so awesome, im suprised you dont go live on twitch. you already have great viewers ready to learn. Seriously this made my OctoberFestive few months. This will definitely aid in HTB BB Course and test to actually get certified, i know its not a requirement, 🤓 but every little bit helps. Thanks again.
I am going to try and do my first live on UA-cam October 9 😳
@@ryan_phdsechi 👋 , I would like to ask a question : can I still watch this video ? I know nothing about Ethical Hacking, just some html , javascript, python and css . Is this a complete course ? Like it may not teach every topic in detail but does it cover most topic's overview ?
@@ryan_phdsec Can't wait bro!!!
you are the best bro, the material you convey is very easy to understand, I am very grateful to you.
Thanks sir I am Indian I didn't get best tutorial like yours.
💗🤩 Thanks for help us
You are most welcome
Thanks .One of the best bug bounty video on UA-cam..
This is what I needed to show all the script kiddies in a discord server. This is great stuff!! Thank you keep it up. I’ll spread this video I know it took u more than 11 hours
Wow this is truly amazing. This probably took more time than I can imagine. Thanks for the help
Thanks so much for taking the time and tirelessly sharing your knowledge with the community Ryan. You're immensely appreciated!!
You freaking boss 😎 I just really appreciate your approach to teaching people because you never give the tone “you should already know this but if you don’t …”
You’re not arrogant and provide such a wealth of information.
Thank you again 🥇🥳
--
Unrelated but as a nerd, who are you cosplaying for Halloween?!?!
why are you so interested in hacking and what kind of nerd you are ?
This is brilliant! Can't thank you enough for this free course. ❤
CRAZY material. I already do bb work and I''m educated on it, but I'm just going to watch this for fun. Will definitely share this about for others. Kudos to you my man.
Awesome, thank you!
What I need to learn to start bug bounty
bro can you suggest any course for beginner to advanced? please
awsome! I jreally like this video and I have to say, I am blown away by how informative and well-structured it is. As someone who is just starting out in the world of bug bounty hunting, I found this video to be incredibly helpful in giving me a solid foundation of knowledge and skills to build upon.
thanks for this i can't buy merch now but when i find my first bug I will buy it. Love that you do this for the communtity
Meaning u get pay for it ???
How so?
@@Moodboard39 if you do bug bountys you get sometimes a payout
@@vdmoscar5963 oh?? Nice..is hackeron one of them? Or gotta find some company?
@@Moodboard39 yea hackerone. (im a year laye but ok)
Nice video. Only an hour and half in but you already helped me understand Shodan a little better than my instructor did in my first ethical hacking class. Keep it up man!!!
This is one of the best courses on youtube!
Brilliant video! Thank you for such a effort!
Thank you so much! I’m currently trying to get into bug bounty and this tutorial is perfect! ❤
That's really a great guide. I'd ask if you could make a video on how to go through all the staff in a schematic way, maybe how to understand if a certain spot (for example a certain get/post request shown on burp) can have a vulnerability for a type of injection rather than for another
Bruh, You have no an idea how i loved the way that you teach us❤ anyways i'm attending it one by one, so i'll comment out when i finish the course 💌, Thank You!
Thank you for the course !! Great to have that for free. Just one thing that I see on every course speeking about Kali, everyone advises to pay a subscription for a virtual machine which costs about 150-170$ for my part I chose for the same price to buy an old lenovo thinkpad laptop with i5 + 4g of ram that i can up 8gb later
Same price and I have it for life and it can potentially be useful for something else later, it's an option that could be interesting to mention too
Brother please speak slowly and try to give more example with definition related to every chapter so that we can understand it in better way, thanks.
Thankyuu so muchh for the updated course!! You're a great teacher, your content is the best cybersecurity content available on UA-cam! Keep posting such amazing videos! Much Love ❤
I am from India you are excellent dear wonderful .Excellent Thanks for Sharing Knowledge.
Lots love from India 🇮🇳🇮🇳 god bless you ❤️
One of my best course so far
Man hands down in front of you you are one in a Billion ♥
Hello,
this free course is awesome.
keep up the good work.
I promise you that I will support you with my 1st bug bounty after I earn ..cause I'm not totally broke 😂
Bro you are like a god, in this world where HTB charges 200$+ for courses you are providing it for free
LOVE THIS! thanks and so appreciate by your dedication onto this!
sir,
super close to 14k 🥳
sir you are no less than a god for us noobs
thanks a ton for sharing this
lots of love from india
💌🤟😍😍😍😍😍😍😍😍😍😇🥰
Thank you so much for all you do I'm excited to watch your other videos
Finally thank you soooo much! Will try to finish it ASAP
Thank you very much for this course, you are wonderful 🤩❤
Nice, i like your way of making notes. Some good tips you gave. Thx fot that.
I never wrote comments, but you deserve more than thanks
In Islam we should appreciate the effort you made as the prophet peace be abone hem thought us. the least thing I can do for you is to pray for you.
I pray you have a great life.
This man deserves heaven +1
I'm new to your channel just the comments show me that I won't be bored
Great course. Time well spent and good explanations (and entertaining) . Some parts of the later sections before python flew over my head, but I guess that's kind of expected. I'll definitely check other courses and videos from you.
Woooow guys these hacking and bug bounty are great 🎉🎊👍
Trust me you will become famous on UA-cam like others cybersecurity channel like David Bombal , Hammond , xss rat ...
Great video, appreciate you sharing your knowledge!
you are good teacher may ALLAH give you hidayat
All of this course is meat, thank you dude for course. This was what i search for
Very meat
This huy has been a hell of a teacher
Awesome course , thankyou so so so so so much !
Your course is just awesome Sir. I really appreciate the time and effort you spent to come up with such GREAT COURSE! I actually wanted to ask a question. Do you think it's important to learn about WAF and how to bypass it to discover bugs?, I think most webs use it which makes it harder to discover vulnerabilities..
Your videos are very helpful and well explained but can you please create a video about how to write a full report for bug crowd or hacker one of a live bug so that i can have great idea of how to actually present bugs i am sure many other would such problems
There is a firefox extension called 'foxy proxy' that will make it a lot easier to connect/disconnect to burp.
I used foxyproxy when it first came out and it was buggy and I have never re-installed it
@@ryan_phdsec I think it is not buggy now, and Thanks for the effort you put in your videos.
☺️ thank you! That's Amazing 🥰
You are amazing Mate ! From Australia
Great video , you’re a great teacher
Dude I have needed this sooooooo bad
Thank you so much dude; that course is beneficial
Seriously thank you so much
Dude this is awesome❤❤
Thank you for this wonderful course🙃.
You are the best.
Best wishes from Israel.
Bro is already on 1.25x speed.. 😂
Btw Useful content and great presentation 😃
😅
Great Vid mate keep posting
Sir, you are a life saver for me.❣️
Great work man !!
I believe the reason why the functions that are used in SQL are uppercased is because that is part of the SQL syntax. For example: If you want to select everything from a table; you would do in general SQL. You would do: SELECT * FROM table or something along the lines of that. You see here that the table is lowercased; this is because in the SQL syntax the functions are Uppercased, while the tables are lowercase.
nahh u can use lower cased .i've tried
@@JishnuLOL Most administrators write the SQL syntax with upper case letters to determine the difference between the SQL syntax and strings/int. I will admit I didn't know SQL at the time. But what the fuck... this guy says he has a PHd but doesn't act it, lmfao.
@@D4rk.L0tus The dude made a free 11h video, so how about showing some respect ?
might be that the integer will be linking it to row zero in the table that gives access to admin panel
Thank you so much for the valuable course
Thank you for sharing ! great information
Thank you very much, i'm learnt a lot of new things!
This is awesome. Thank you!
Hello Boss, I am on Disability and need to come off to make a living, I am learning your first course the best I van, I am not able to support at the current time , But I want to say I will be able to do support you somehow just as soon as I can learn a few courses, get in the field and I got you, Im 48, if you have some ideas how I can get into IT even as a non tech person would be awesome. thank you for helping the less fortunate change our lives. thank you very much.
how the progress bro
Thank you so much I glad you made this video.
Glad it was helpful!
Amazing video bro
I love this man's work
Really good course, thank you!
Hey, I'm the FBI. Only here for educational purposes :)
Thank you. I just started to watch. First question, why not WSL2? Btw I like wm ware and Wsl.
Bro what a nice intro 👍