@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from DARKNET BR
How to use ffuf - Hacker Toolbox

ffuf is quickly becoming a key tool for bug bounty hunters, but how do you use it? In this video I start at the basics showing some really neat features of ffuf and how you can use some simple one-liners to do rather complex fuzzing!

https://youtu.be/aN3Nayvd7FU
Who, What, Where, When, Wordlist by @TomNomNom #NahamCon2020

00:25 what is a wordlist ? its a list of words, used for guessing things instead 01:04 WHY are they useful ? 02:21 WHERE, subdomain enumeration 02:41 path guessing, ffuf 02:49 authentication guessing, kind of the oldest use case username and passwords 02:57 API, RPC 03:17 headers 03:35 Pre-baked lists 04:49 what's the problem with those wordlists 06:25 custom wordlist 07:28 manually curated list 08:17 target-specific lists 09:36 Getting path data 12:08 google dorking 12:56 webpaste 15:28 i just show a little bit of the configuration of this webpaste extension 18:55 processing path data, unfurl 20:37 sed, extract all the parts 22:45 Using the list, ffuf is good, burp intruder, meg, concurl 24:50 finding words unique to a target 26:35 tokenizing

https://youtu.be/W4_QCSIujQ4
Defesa do Trabalho de Graduação (TCC) em Engenharia da Computação no ITA em 2020

https://youtu.be/Pnjjm65N-DA