Войти
  • 16687Просмотров
  • 4 месяца назадОпубликованоrs0n_live

My Full Bug Bounty Recon Methodology Using My Bug Bounty Hunting Framework | Beta Launch @ DEFCON 33

🚀🔥🙏 Please consider becoming a member to support my work 🙏🔥🚀 Support! - New Discord! - Hire Me! - Watch Live! - Free Tools! - Connect! - Repo: 00:00 - Introduction & What Problem is My Framework Solving? 03:33 - Installing The Ars0n Framework v2 Beta 07:10 - Improvements From Version 1 to Version 2 07:53 - Understanding the README 10:58 - Troubleshooting 12:25 - Asking rs0n For Help (IMPORTANT!) 16:34 - Getting Started 18:24 - Scope Target Workflows 25:45 - Importing Scan Data 28:57 - Understanding the UX/UI 32:25 - Discovering On-Prem Assets 40:40 - Root Domain Discovery (No API Key) 50:54 - Root Domain Discovery (API Key) 53:51 - Consolidate Root Domains & Add Wildcard Targets 59:42 - Wildcard Workflow Auto Scan 1:05:12 - Amass Enum in Wildcard Workflow 1:10:03 - Subdomain Scraping 1:12:10 - Brute Force 1:14:15 - Link/JavaScript Discovery 1:15:30 - Screenshots, Metadata Scan, & ROI Report 1:18:55 - Cloud Asset Enumeration - Amass Enum 1:24:20 - Cloud Asset Enumeration - DNSx 1:26:23 - Cloud Asset Enumeration - Cloud Enum 1:32:29 - Cloud Asset Enumeration - Katana 1:35:30 - Building & Exploring the Company Attack Surface 1:38:50 - Nuclei Scanning 1:42:25 - Settings 1:46:05 - Import/Export Data 1:47:14 - Supporting My Work 1:49:39 - Wrap Up & Final Thoughts