Really appreciate ben that you use screen-recorder, also literally amazing helpful content🔥, we want this kind of videos in the future also, Thanks for your efforts. 🙌
Absolutely please make that video. Virtual host scanning is kinda of under appreciated and rarely explained. Thanks as always for a great video and for taking the time to go over this.
Nahamsec, how do you create CTFs? I am in a cybersecurity class and I took on the task of trying to create CTFs for a project. How am I supposed to code front end and know how to make vulnerable code in the backend? Do you use frameworks or reuse code or start from the bottom?
Isn't this more of a 'how to identify reverse proxies' vs 'how to identify virtual hosts'? A virtual host, in my eyes, is more along the lines of something like ESX or Hyper-V
Today I completely understood this after watching your video.
Thanks a million, Naham!
Glad it was helpful!
Yes, please do make more videos like this one! And, thank you so so very much for putting all of this online!
Really appreciate ben that you use screen-recorder, also literally amazing helpful content🔥, we want this kind of videos in the future also, Thanks for your efforts. 🙌
Thanks! Will continue to record the screen with this new software since it’s looking way better!
@@NahamSec Yeah video is much more clear now
Have you tried palying with the bitrate and all with previous software
Hello i am shakib form bangladesh. This video is really help full to understand what is virtual host in short(vhost) ... i love this content
Actually this is one of the best videos for me because of the simulation of the attack surface
Absolutely please make that video. Virtual host scanning is kinda of under appreciated and rarely explained. Thanks as always for a great video and for taking the time to go over this.
Ben, Just wanna say You are amazing! Your work is amazing! THANKS A LOT FOR ALL THESE CONTENT FOR FREE!
Continue with this pretty clear content, That makes hunters know the process. and nice word هكر
Congrats on 100k subs! Thanks for this great content as always!
Also it's not necessary to to brute force with the same domain, You can catch other domain with same IP in vhosts.
New things for me bro thank you for your effort to help us in this journey.
Bro this is gold!! Keep going.
thank you for sharing .. for me i prefer doing subdomain enumeration using ffuf with vhost brute forcing host header it effective
Nice tips, thank you Ben🔥
Amazing content thanks ben
its like hack the box ctf woww nice tips
This is super useful for work
yes, please make those videos :)
I am facing problems with adding hosts on /etc/hosts I am not able to open the subdomain it says invalid hosts can you please solve thank you
What if the domain we are targeting using a load balancer that is resolved to different IP for each request to the domain or hiding behind cloudflare?
Good video Ben
ممنون عالی بود
Awesome video, but I wanna ask what if the target is behing a WAF?
make videos about your findings without telling targets name or any asset just step to reproduce kinda things
Check out my but bounty stories series. I started it last week ;)
Can you please suggest me resources to learn for bug bounty .. I am currently going for portswigger labs
Check out my how to bug bounty videos on my channel!
Ok thanks
Portswigger is enough i think
Thanks
Sir, I want to know more about Vhost
I wat to learn bug hunting in deep level so what can i do?
You never made a video on blind xss?
Nahamsec, how do you create CTFs? I am in a cybersecurity class and I took on the task of trying to create CTFs for a project. How am I supposed to code front end and know how to make vulnerable code in the backend? Do you use frameworks or reuse code or start from the bottom?
Make a video on virtual hosts deeply
i like that shirt is says hacker in arabic 😂
Nice T-shirt ❤️👀
Thanks 😋
@@NahamSec you're welcome.
من این تيشرت رو میخوام!
❤
Isn't this more of a 'how to identify reverse proxies' vs 'how to identify virtual hosts'? A virtual host, in my eyes, is more along the lines of something like ESX or Hyper-V
Waiting for first Bug Bounty finding can u help me @Nahmsec more than 8 months No Bounty's
It'll happen soon!
I want this tshirt, from where can I get it ? @nahamsec