I hope you enjoyed this video! If so, please consider dropping a like and subscribing.
@InsiderPhD
4 жыл бұрын
Thank you so much for the shoutout! I'm actually working on some new API videos coming real soon including more recon techniques, understanding JSON, API hacking tools like Postman so stay tuned for even more API goodness!
@volatileobj3cts
2 жыл бұрын
Total side note. This is the first time I've actually ever NEEDED the sponsor of a KZitem video.
@laurent9255
3 жыл бұрын
burp intruder is just a multithreaded fuzzing script that can be made in pure python . Worth the effort .
@LTT.Official
4 жыл бұрын
Great stuff as usual Heath, just finished the Udemy course, thoroughly enjoyed it.
@abdulsamad-as
4 жыл бұрын
Did you find any real world bug by using that course info???
@LTT.Official
4 жыл бұрын
@@abdulsamad-as actually yes, it better refined my vulnerability assessment skills I undertake for work, helped me be more efficient.
@theintrovert894
3 жыл бұрын
Can u give me thar course Plzzz❤️
@watchlistsclips3196
3 жыл бұрын
@@theintrovert894 Why can't u just buy the course.It is a gold mine actually.It should be given for 2000$ for what he is teaching.He gives u more content covering all areas.Why can't u just buy it.Just buy the course.No one going to give you this and mr.cybermentor deserve to get some support.
@didyouknowamazingfacts2790
3 ай бұрын
That's really F'ed up that company didn't even acknowledge you or say thank you.
@virajchoksi7845
4 жыл бұрын
Great! Make this your new series: ' Real bug series'. Add real world bug hunting recon streams as well if possible. Or else just some poc videos.
@crassProgrammer
4 жыл бұрын
You are taking out time to make these videos and help people like me to learn more, that's very much great. Thank you very much man and i expect many more videos.
@HackinGeeK
2 жыл бұрын
Thank you man for the insiderPHD
@joeyalfaro2323
3 жыл бұрын
I remember looking at hacker one bounty selection. I'm not gonna read all this so copy and pasted words to voice. Then made list ones that were paying money. Wasted bunch time learning burp suite what nightmare. I take notes get ideas what learn next. Sometimes you have submerge yourself in topic run with idea. I'm deeply involved in self sabotage. Saying nothing ever panned out why should this be any different. One guy had some great advice to himself if he was just starting find your first bug. Good recon all vulnerabilities. Part learning figuring it out yourself
@tucanh7781
Жыл бұрын
Thanks mentor, it's very useful!
@TCMSecurityAcademy
Жыл бұрын
You are welcome!
@Z0nd4
Жыл бұрын
Very useful. Thanks!
@logmantarig
3 жыл бұрын
Really thanks very much, that's gonna help a lot with API enumeration
@syedz7805
4 жыл бұрын
TCM - you are really my inspiration
@adityapaithon6499
4 жыл бұрын
Thanks dude, really informative
@kishorebolt3065
4 жыл бұрын
Thank you TCM I had 0 idea of api. This helped me a lot
@bobbychase5616
4 жыл бұрын
one on one sounds aweome! i need a mentor
@prtk4055
4 жыл бұрын
Ikr, heath would be such a great mentor to have.
@hilsoville1
2 жыл бұрын
You'll probably find them in the CYBER space
@0xsunil
4 жыл бұрын
By fuzzing one can get GET /api-2.0/sms/ But your blurred screenshots shows there was something more than that I mean, GET /api-2.0/sms/blurred-content/ Does that mean you won't get any PII data back in response when you just hit: GET /api-2.0/sms/ Just a noob here. Trying to understand. Thanks for read and/or reply.
@krishnathakur7982
4 жыл бұрын
Hi Heath, Can you create some CTF like stuff related to API testing so we can understand more deeply.
@AbhishekSingh-qh9df
4 жыл бұрын
Can you please release a course on api pentesting or web application penetration testing
@SatishSharma-gt5vo
4 жыл бұрын
Like as always, great stuff. Thanks for all the awesome information and resources.
@aviralgupta9869
4 жыл бұрын
Any tips if u can share to find vulnerable parameters any tool will be a great help currently I use gf pattern with gau .
@TCMSecurityAcademy
4 жыл бұрын
Ffuf and arjun are good, but I always go back to burp
@aviralgupta9869
4 жыл бұрын
@@TCMSecurityAcademy thnx
@aviralgupta9869
4 жыл бұрын
@@TCMSecurityAcademy I came to know from various people that js files in website contains some juicy content can u tell me a kind of tool which can I used to download all js files without manualy going to burp to see individually
@aniketpatel8655
4 жыл бұрын
Too much informative video 👍
@KIRIKTECH
4 жыл бұрын
Informative video sir😍 tq
@youfauchiha8531
4 жыл бұрын
That T-shirt should say: Amber is my fuel 😂😂 thanks for your videos man, you're the best
@TCMSecurityAcademy
4 жыл бұрын
Haha she is my fuel!
@infohacking
4 жыл бұрын
Always love you sir😊....love from India 🇮🇳🇮🇳
@theoffsecguy9406
4 жыл бұрын
Every time You Nailed with pretty much great resources ! \O/ thenksssssssssss @TheCyberMentor
@akshaydeodare6149
4 жыл бұрын
I couldn't have maintained such calmness if that happened to me ⚡️! Cant stand bad programs tbh
@rajipandya3574
4 жыл бұрын
You are truly The Cyber Mentor!!
@nadakuditigopikrishna6587
3 жыл бұрын
Thank you for nice content!
@sachinbhatt4487
4 жыл бұрын
TCM♥️🔥🔥
@RashtrwadiHarshitSanatani
3 жыл бұрын
Thank you brother ❤️
@parthasarathidas6217
3 жыл бұрын
Thanks Mentor awesome content as always 😎😎😎
@ahmedalsanosi5538
4 жыл бұрын
Thanks for sharing this 🙂
@nanocybersec1316
3 жыл бұрын
Again man you on Fire excellent
@nareshg7292
2 жыл бұрын
why did d rate limiting not kick u out while fuzzing ?
@tobypuschmann8639
4 жыл бұрын
Wait, you do 1:1 ?!?!?! Yes please !!!
@MrKarn0007
4 жыл бұрын
thank you forever bro
@jainishpandya4246
3 жыл бұрын
Superb
@vishnuvardhanvanaparthi7002
4 жыл бұрын
Great stuff
@iqyou-gw4kd
Жыл бұрын
Can you give me requirements for application Android pantest
@damani9060
4 жыл бұрын
legend as always thank you for the content.
@yutup509
4 жыл бұрын
Thanks man, you are the best
@saqibarif7144
3 жыл бұрын
Great
@debprasadbanerjee5005
3 жыл бұрын
Damn, we don't deserve this quality content
@tester2619
4 жыл бұрын
so are u fuzzing the parameter of `/sms/` path?
@AN0NPH03N1X
4 жыл бұрын
mate, after you found the sms parameter, what did you append to it next , like sms/?(it was blurred in your video) and how did you obtained that parameter after /sms/?
@TCMSecurityAcademy
4 жыл бұрын
It auto-appended stuff at the end, but it could have been an indicator of the platform, so I blurred it. The method I showed was exactly how it was found.
@crassProgrammer
4 жыл бұрын
@@TCMSecurityAcademy Thanks man this helped me a lot.
@balaamuthan6408
4 жыл бұрын
Longtime no see
@picanzo
4 жыл бұрын
Wow men, what a shitty actitud from that program!! And this video... super pratical and educational.. Its good to have videos where you real situations examples. Much easier to understand!!
@cysantosh6530
4 жыл бұрын
Sir after a long time...! Anyways stay safe and give knowledge that safely 😅 . Support from my side always 🇮🇳🔥
@TCMSecurityAcademy
4 жыл бұрын
Much love!
@StefanRows
4 жыл бұрын
Like + Comment ofc :)
@ndanilo
4 жыл бұрын
sup
@V1P3R05
4 жыл бұрын
How can I get a one-on-one with you?🤔🤔
@luismejia857
4 жыл бұрын
tcm-sec.com/one-on-one-tutoring/
@TheCyberExpert
4 жыл бұрын
It took you so long to post a video
@TCMSecurityAcademy
4 жыл бұрын
I'm a busy guy!
@ca7986
4 жыл бұрын
❤️
@AmitSingh-sb5nr
4 жыл бұрын
I am stil not able to join your discord server
@thanoscar7822
4 жыл бұрын
OMG no way do you like listening to Jonathan Young songs ? i would never imagine lol, anyway thanks for the video very helpful !!!
Пікірлер: 78