⏭Hello and Welcome to the new video where I am going to solve the biggest confusion ever which is what after recon/information gathering. I mean once you gather information like subdomains, dns enumerated, brute forcing directory and much more info, what will you do with that information?
In this video I will share bug hunting checklist or methodology which I personally use for my penetration testing.
⏭Checklist 1: bit.ly/3cZMNUO
Checklist 2: bit.ly/3cVl5bt
🔥Before you start the video be careful, this video is just made for cybersecurity educational purpose and we don't want to promote any illegal stuff over here. We along with RU-vid are not responsible for any kind of act you perform using our video.🔥
⏭If you love the value provided in the video then you must 🔴Subscribe Us for more videos talking about InfoSec in Hindi.
⏭Aur suno Like. Share. Comment bhi kar dena.
⏭The Resources and Link I used in the video are as follow-:
⏭Let's connect on Social Media
1)My Personal Account(IG)-: / thecyberzeel
2)Spin The Hack Account(IG)-: / spinthehack
3)My Personal Account(Twitter)-: / thecyberzeel
Thanks For Watching😊♥
Peace.
#methodology #checklist #spinthehack #bugbountytips
EVERYTHING IS JUST FOR EDUCATIONAL PURPORSE.
6 апр 2021