- SQL Injection attack #3 - the importance of sleep
8
- Other challenges & Easter eggs
9
- Giveaway
10
- Start of live bug bounty enumeration
11
- Finding subdomains with sublist3r and crt.sh
12
- Extracting data from crt.sh
13
- For loop to test if site is up
14
- Using eyewitness to screenshot hosts
15
- Manual enumeration
16
- Begin AMA
Description:
Dive deep into SQL injection techniques and live bug bounty hunting in this comprehensive 2-hour 52-minute video. Learn about advanced SQL injection attacks, including the use of UNIONs and the importance of sleep commands. Compare sqlmap, Burp Active, and manual approaches to SQL injection. Explore live bug bounty enumeration techniques, including subdomain discovery with sublist3r and crt.sh, data extraction, and host screening. Gain insights on manual enumeration and participate in an Ask Me Anything session. Perfect for aspiring ethical hackers and cybersecurity enthusiasts looking to enhance their web application testing skills.
Web App Testing - SQL Injections and Live Bug Bounty Hunting