The Bug Hunter's Methodology - Application Analysis | Jason Haddix

  Рет қаралды 82,864

HackerOne

HackerOne

Жыл бұрын

Jason is the Head of Security for a leading videogame company. Previously he was VP of Trust and Security at Bugcrowd and currently holds the 29th all-time ranked researcher position. Before that, Jason had a distinguished 10-year career as a penetration tester and was Director of Penetration Testing for HP. He is a hacker and bug hunter through and through and currently specializes in recon and web application analysis. He has also held positions doing mobile penetration testing, network/infrastructure security assessments, and static analysis. Jason lives in Colorado with his wife and three children. Jason has presented all over the world teaching ethical hacking, including speaking and keynotes at conferences such as DEFCON, BlackHat, RSA, Rootcon, NullCon, B-sides, and SANS.
This H@cktivitycon talk was given at the H1-702 Live Hacking Event in Las Vegas!
Follow Jason: / jhaddix
▼ Keep up with us ▼
◇ Twitter → / hacker0x01​
◇ Twitch → / hackeronetv
◇ Instagram → hacker0x01...

Пікірлер: 50
@AnthonyMcqueen1987
@AnthonyMcqueen1987 3 ай бұрын
Unlike most top researchers out there who do nothing but flex their bounties and give cryptic generic advise or how they got those bugs to me those people add nothing to the community. But people like Haddix who doesnt show off how much he has made or flex his bounties actually explains in detail what he does. He also updates his style and methodology and its not for everyone but he does give detail to how he finds bugs and does his recon unlike most out there and i respect that. Researchers who flex their bounties offer nothing to the community Researchers like Haddix offer a lot to the community.
@auwalsalisu7889
@auwalsalisu7889 3 ай бұрын
you said nothing but pure 100% truth, you literally spoke my mind
@AnthonyMcqueen1987
@AnthonyMcqueen1987 3 ай бұрын
@auwalsalisu7889 I am just sick of researchers out there who do nothing and show off their bounties. These people make the profession worse IMO and add nothing. Haddix on the other hand I respect.
@shiiswii4136
@shiiswii4136 2 ай бұрын
​@@AnthonyMcqueen1987look up Ryan John and ippsec, these guys are pure fundamentals and no nonsense in the videos
@madcane13
@madcane13 Жыл бұрын
json headache... utterly... no words can explain how brilliant he is... you rock
@rynomas4948
@rynomas4948 Жыл бұрын
He is haddix bro, not headache. 😆
@viralledshow7079
@viralledshow7079 Жыл бұрын
@@rynomas4948might be auto correct error brother....!😂
@wk8173
@wk8173 10 ай бұрын
@@rynomas4948 grateful he didn't go for json headless💀
@SankizTime
@SankizTime 10 ай бұрын
Lmao😂
@skysunset877
@skysunset877 5 ай бұрын
I'm deeply grateful that you explained this specific procedure for bugbounty. As a beginner, it helped me a lot with my studies.
@goohaver
@goohaver 2 ай бұрын
same here. good luck homie
@iqyou-gw4kd
@iqyou-gw4kd Жыл бұрын
Thank you everyone for helping the community evolve
@popo_hack
@popo_hack Жыл бұрын
Thank you Jason for this amazing presentation, it was very fruitful with alot of knowledge. I think it's very important to know where to start testing and what are the tools that can help you doing that😀
@AlecMaly
@AlecMaly Жыл бұрын
Great presentation! Thank you for sharing your expertise!
@eyephpmyadmin6988
@eyephpmyadmin6988 9 ай бұрын
Took notes on everything, every tool, all the methodology
@MdMilonHossainNil
@MdMilonHossainNil Жыл бұрын
❤❤Oh my God, this is what I've been waiting for!! It looks beautiful!!❤❤
@fp1036
@fp1036 Ай бұрын
Thank you for your passionate sharing Sir!
@emanuelepicariello
@emanuelepicariello 9 ай бұрын
Great video thanks, it’s time to build a proper methodology now 🕵🏽‍♂️
@william_ade
@william_ade Жыл бұрын
This is brilliant !
@wise.wanderer.00
@wise.wanderer.00 Жыл бұрын
Very informative talk
@Khal_Rheg0
@Khal_Rheg0 3 ай бұрын
Thank you!
@samgold9151
@samgold9151 Жыл бұрын
Thank you
@AmineAb
@AmineAb Жыл бұрын
Really informative talk, but at the end he wasn’t using Notion for the note-taking part as stated, it was Obsidian.
@esamlasheen453
@esamlasheen453 Жыл бұрын
hhh i see it too
@sapienshack1711
@sapienshack1711 4 ай бұрын
Jason Haddix you are awesome
@bugs-lk3jf
@bugs-lk3jf 11 ай бұрын
Great Content , like a Boss
@william_ade
@william_ade Жыл бұрын
how can we get the slides ??
@reactivicky
@reactivicky Жыл бұрын
Nice tips.
@actuallyclover
@actuallyclover 2 ай бұрын
I went to college with Corben! Super smart guy
@4liraah
@4liraah 5 ай бұрын
Thanks for the talk! Any chance we can get a link to the slides?
@Booom1444-_-
@Booom1444-_- 4 ай бұрын
Slides?
@Ln0rag
@Ln0rag 11 ай бұрын
where to find the slides file ?
@0xfsec
@0xfsec Жыл бұрын
Can I get the slide presentation?
@godzab
@godzab Жыл бұрын
I second this!
@hamidrahamaabakar7995
@hamidrahamaabakar7995 6 ай бұрын
Good morning I'm very appreciate you
@thehackr7
@thehackr7 Жыл бұрын
nyc one
@TheCyberWarriorGuy
@TheCyberWarriorGuy Жыл бұрын
Legend :)
@ExploitDeveloper
@ExploitDeveloper Жыл бұрын
thats good
@anasshaikh5778
@anasshaikh5778 Жыл бұрын
Rustscan might not be helpful Since most of the programs have speed limitations like 10 req/s etc..
@esamlasheen453
@esamlasheen453 Жыл бұрын
45:36 Jason It's obsidian not notion!
@awanakb4867
@awanakb4867 Жыл бұрын
how can i find these word lists
@AmineAb
@AmineAb Жыл бұрын
Everthing is on the talk.. if you can’t find those wordlists, I don’t know how you will find bugs
@awanakb4867
@awanakb4867 Жыл бұрын
@@AmineAb i found them already. it just needed some attention.
@mariarahelvarnhagen2729
@mariarahelvarnhagen2729 Жыл бұрын
The Financial Instruments Game
@shantanusharma5624
@shantanusharma5624 Жыл бұрын
Woah!! I'm the 1Kth liker of this video
@garywilburn7384
@garywilburn7384 Жыл бұрын
I'll give you a dollar if you learn to pronounce "obligatory" properly 😂
@ll-ruby..gloom-ll
@ll-ruby..gloom-ll 5 ай бұрын
he did
@bountyproofs
@bountyproofs Ай бұрын
if you don't CREATE your own METHODOLOGY this is worth NOTHING for YOU
@CaseyStrouse
@CaseyStrouse Жыл бұрын
jsnice is the best tool I've found for making sense of obfuscated js. Definitely check it out.
Modern Adversarial Reconnaissance - Long Live the External
40:43
SANS Offensive Operations
Рет қаралды 3,5 М.
2.2 Android Architecture Linux Kernel
3:59
Mobile Hacking Lab
Рет қаралды 753
WHO DO I LOVE MOST?
00:22
dednahype
Рет қаралды 7 МЛН
Increíble final 😱
00:37
Juan De Dios Pantoja 2
Рет қаралды 32 МЛН
$10,000 Every Day You Survive In The Wilderness
26:44
MrBeast
Рет қаралды 127 МЛН
Её Старший Брат Настоящий Джентельмен ❤️
00:18
Глеб Рандалайнен
Рет қаралды 7 МЛН
“Recon Like an Adversary” by Jason Haddix at IWCON2023
1:01:13
Infosec Studio by IW
Рет қаралды 11 М.
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
26:37
David Bombal
Рет қаралды 70 М.
Learn Nuclei in 30 minutes - DEF CON Nuclei Demo
35:48
ProjectDiscovery
Рет қаралды 7 М.
From zero to 6-digit bug bounty earnings in 1 year - Johan Carlsson - BBRD podcast #3
1:08:37
How much money I made in my 1st year of bug bounty? Bounty vlog #4
17:02
Bug Bounty Reports Explained
Рет қаралды 136 М.
Hacker101 - JavaScript for Hackers (Created by @STOKfredrik)
24:17
Настоящий детектор , который нужен каждому!
0:16
Ender Пересказы
Рет қаралды 132 М.
How To Unlock Your iphone With Your Voice
0:34
요루퐁 yorupong
Рет қаралды 20 МЛН
5 НЕЛЕГАЛЬНЫХ гаджетов, за которые вас посадят
0:59
Кибер Андерсон
Рет қаралды 1,5 МЛН
Непробиваемый телевизор 🤯
0:23
FATA MORGANA
Рет қаралды 157 М.