Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

BSidesBUD2022: Bug Bounty Recon The Right Way

Автор: BSides Budapest IT Security Conference

Загружено: 2023-06-11

Просмотров: 14963

Описание:

This presentation was held at #BSidesBUD2022 IT security conference on 26th May 2022.

Khalil A. Lemtaffah - Bug Bounty Recon The Right Way

When it comes to web applications security testing and looking for bugs, reconnaissance plays a crucial step in identifying the right path for spotting vulnerabilities. The power of deep manual recon led to some serious bugs discovered in a short amount of time. In the other hand, some people use automation in this process as an intention to speed it up and not waste too much time in understanding the organization and the technologies it uses. In this talk we are going to cover the (unique) ways and methods to perform a healthy recon process on a bug bounty program. We will also cover some real world examples of bugs found using different recon techniques, as well as some tips to enhance your searching methodologies.

https://bsidesbud.com
All rights reserved.

#BSidesBUD2022 #BSides #BugBounty

BSidesBUD2022: Bug Bounty Recon The Right Way

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#4301 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "IullejdP6Kc" ["related_video_title"]=> string(58) "Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025" ["posted_time"]=> string(21) "9 дней назад" ["channelName"]=> string(38) "BSides Budapest IT Security Conference" } [1]=> object(stdClass)#4274 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "QhpqBnu5MXo" ["related_video_title"]=> string(85) "Top-Tier Bug Bounty Hunter Mindset - Yassine Aboukir KEYNOTE at BSides Ahmedabad 2022" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(16) "BSides Ahmedabad" } [2]=> object(stdClass)#4299 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "4ww9o7-z924" ["related_video_title"]=> string(114) "BSidesBUD2019: OWASP Top 10 Like I’m Five: From A Bug Bounty Hunter's Perspective - Dávid Schütz" ["posted_time"]=> string(19) "6 лет назад" ["channelName"]=> string(38) "BSides Budapest IT Security Conference" } [3]=> object(stdClass)#4306 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "6mVMVLYKBYI" ["related_video_title"]=> string(58) "Bug bounty tools that actually land bugs with Arthur Aires" ["posted_time"]=> string(25) "2 недели назад" ["channelName"]=> string(28) "Bug Bounty Reports Explained" } [4]=> object(stdClass)#4285 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "4eFF7QZX90I" ["related_video_title"]=> string(50) "Local Admin in less than 60 seconds #BSidesBUD2024" ["posted_time"]=> string(27) "5 месяцев назад" ["channelName"]=> string(38) "BSides Budapest IT Security Conference" } [5]=> object(stdClass)#4303 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "vFk0XtHfuSg" ["related_video_title"]=> string(58) "Attacking organizations with big scopes: from zero to hero" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(19) "Positive Events Eng" } [6]=> object(stdClass)#4298 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "CJnXjWXXB1Y" ["related_video_title"]=> string(45) "Essence of recon in bug bounty and pentesting" ["posted_time"]=> string(23) "1 месяц назад" ["channelName"]=> string(19) "Positive Events Eng" } [7]=> object(stdClass)#4308 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "hov2MQEix3w" ["related_video_title"]=> string(46) "BSidesBUD2023: 10 macOS Persistence Techniques" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(38) "BSides Budapest IT Security Conference" } [8]=> object(stdClass)#4284 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "aVOraNqA-n8" ["related_video_title"]=> string(70) "CrikeyCon 2021 - Shubham Shah - Hacking on Bug Bounties for Five Years" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> string(9) "CrikeyCon" } [9]=> object(stdClass)#4302 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "z1rOMrCOGA0" ["related_video_title"]=> string(53) "Recon Skills and Tips | IWCON-W22 Talk by Orwa Atiyat" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(20) "Infosec Studio by IW" } }
Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025

Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025

Top-Tier Bug Bounty Hunter Mindset - Yassine Aboukir KEYNOTE at BSides Ahmedabad 2022

Top-Tier Bug Bounty Hunter Mindset - Yassine Aboukir KEYNOTE at BSides Ahmedabad 2022

BSidesBUD2019: OWASP Top 10 Like I’m Five: From A Bug Bounty Hunter's Perspective - Dávid Schütz

BSidesBUD2019: OWASP Top 10 Like I’m Five: From A Bug Bounty Hunter's Perspective - Dávid Schütz

Bug bounty tools that actually land bugs with Arthur Aires

Bug bounty tools that actually land bugs with Arthur Aires

Local Admin in less than 60 seconds #BSidesBUD2024

Local Admin in less than 60 seconds #BSidesBUD2024

Attacking organizations with big scopes: from zero to hero

Attacking organizations with big scopes: from zero to hero

Essence of recon in bug bounty and pentesting

Essence of recon in bug bounty and pentesting

BSidesBUD2023: 10 macOS Persistence Techniques

BSidesBUD2023: 10 macOS Persistence Techniques

CrikeyCon 2021 - Shubham Shah - Hacking on Bug Bounties for Five Years

CrikeyCon 2021 - Shubham Shah - Hacking on Bug Bounties for Five Years

Recon Skills and Tips | IWCON-W22 Talk by Orwa Atiyat

Recon Skills and Tips | IWCON-W22 Talk by Orwa Atiyat

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]