- 33
- 40 033
Assetnote
Australia
เข้าร่วมเมื่อ 4 ก.ย. 2020
Assetnote continually monitors your external attack surface as it evolves allowing you to identify and triage high impact security issues quickly. Our team at Assetnote have been participating in bug bounties and have been application security enthusiasts for just under ten years, and we aim to share the knowledge we have obtained over the years through this channel.
Maximizing Security Outcomes: The Role of ASM in Bug Bounty Programs
Running an effective bug bounty program requires balancing an attractive scope and payout to hunters with an attack surface that challenges hunters to do more than automated scans. Program managers want to pay for skillful findings, not automated ones. In this episode, we talk about how ASM helps optimize your bug bounty program.
For more details about Assetnote's Attack Surface Management Platform, visit assetnote.io/
For more details about Assetnote's Attack Surface Management Platform, visit assetnote.io/
มุมมอง: 391
วีดีโอ
Internet-Wide Recon: Moving Past IP-Centric Approaches
มุมมอง 9312 หลายเดือนก่อน
In this episode, we discuss the blindspots of IP-centric approaches to asset discovery and the importance of understanding the full attack surface of an organization. We unpack the challenges posed by modern cloud architectures, load balancers, and WAFs, and how these can create blind spots in reconnaissance efforts. We also highlight the significance of subdomain data and passive DNS in uncove...
Beyond Shadow IT: Understanding the True Attack Surface of Your Software
มุมมอง 3463 หลายเดือนก่อน
This week's episode dives deep into the concept of shadow exposure and how it relates to third-party software, often overlooked in discussions about shadow IT. We explore the historical context of shadow IT, its evolution, and the real risks associated with widely deployed enterprise software that organizations may not fully understand. Join us as we discuss: - The origins and implications of s...
The Art of Recon: Strategies for Modern Asset Discovery
มุมมอง 6K3 หลายเดือนก่อน
Today, we explore the world of asset discovery and reconnaissance, particularly how these practices have evolved over time. Historically, discussions around reconnaissance have been overly simplistic and tool-centric, often focusing solely on the latest tools rather than the underlying principles and methodologies. Join us as we break down our approach to reconnaissance into five key elements: ...
The Unknown Complexities of DNS Resolution
มุมมอง 6513 หลายเดือนก่อน
In this episode, we dive into the technical complexities of DNS resolution in the context of ASM asset discovery. Join us as we discuss the challenges, implications, and solutions we have encountered while dealing with DNS resolution at scale. From DNS wildcards to security scanning considerations, we explore the importance of DNS data and its role in comprehensive reconnaissance. Our hosts, Mi...
Confusion in the Attack Surface Management Market - Surfacing Security Ep 6
มุมมอง 1K4 หลายเดือนก่อน
Confusion in the Attack Surface Management Market - Surfacing Security Ep 6
Uncovering Critical Vulnerabilities in Magento: A Deep Dive - Surfacing Security Ep 5
มุมมอง 4984 หลายเดือนก่อน
Uncovering Critical Vulnerabilities in Magento: A Deep Dive - Surfacing Security Ep 5
What is "True" Attack Surface Management (ASM)? - Surfacing Security Ep 4
มุมมอง 4554 หลายเดือนก่อน
What is "True" Attack Surface Management (ASM)? - Surfacing Security Ep 4
The Untold Story of Assetnote: Origins and Evolution - Surfacing Security Ep 3
มุมมอง 3714 หลายเดือนก่อน
The Untold Story of Assetnote: Origins and Evolution - Surfacing Security Ep 3
A Deep Dive into Three ServiceNow Vulnerabilities (with Adam Kues) - Surfacing Security Ep 2
มุมมอง 3224 หลายเดือนก่อน
A Deep Dive into Three ServiceNow Vulnerabilities (with Adam Kues) - Surfacing Security Ep 2
Chaining Three Bugs to Access All Your ServiceNow Data (Live Q&A) - Surfacing Security Ep 1
มุมมอง 9834 หลายเดือนก่อน
Chaining Three Bugs to Access All Your ServiceNow Data (Live Q&A) - Surfacing Security Ep 1
Bug Bounty Redacted #5: Second Order Subdomain Takeovers & Logic Bug DoS
มุมมอง 3.6K2 ปีที่แล้ว
Bug Bounty Redacted #5: Second Order Subdomain Takeovers & Logic Bug DoS
Bug Bounty Redacted #4: Writing to S3 buckets & Insecure JWT Implementation
มุมมอง 3.1K2 ปีที่แล้ว
Bug Bounty Redacted #4: Writing to S3 buckets & Insecure JWT Implementation
Bug Bounty Redacted #3: Hacking APIs & XSS, SQLi, WAF Bypass in a regional web application
มุมมอง 5K2 ปีที่แล้ว
Bug Bounty Redacted #3: Hacking APIs & XSS, SQLi, WAF Bypass in a regional web application
Bug Bounty Redacted #2: Third Party Subdomain Takeover & Exposed Admin Interfaces
มุมมอง 3.6K2 ปีที่แล้ว
Bug Bounty Redacted #2: Third Party Subdomain Takeover & Exposed Admin Interfaces
Bug Bounty Redacted #1: Exposed Redis and HAProxy
มุมมอง 6K2 ปีที่แล้ว
Bug Bounty Redacted #1: Exposed Redis and HAProxy
that monitor bend on shubs pov makes me wonder if he tilts his chair when he gets bored or gets really tired looking at the source code and debugging it all day or is it just a preference thing?
You all are amazing
Every ep I watch, I have more questions than answers
With automation is possible to find impactful bugs🎉
Thanks for the video @Assetnote team. The wildcard DNS record issue is a very common yet important issue which is still unexplored by the security community. I was wondering how ASM companies that deal with multiple clients and run discovery scans on hourly basis solve this problem. In theory, there are couple of ways such as distinction between DNS records, response hash (in case fake subdomains respond with a web page) to filter out the fake subdomains but they never work in practical. Can you please shed some light on what are current good ways of atleast minimizing the number of fake subdomains and how companies in ASM market are doing this on scale?
Keep up the good work from Melbourne
This resonates with the recent CUPS vulnerabilities. Not that they weren't serious, but it seemed beforehand they were marketed like a 0-click rce on all Linux platforms
I think the comments misunderstand what these videos are for. They're opening discussion and centering it around the difference their product can make. They're not trying to secure you bug bounties.
Post videos by doing practically
I see Shubs I click
More on this guys
:)
Guys this content is amazing, no doubt in that, but the audience will appreciate and benefit more from something practical like to show us the recon process and methods and other tricks you guys use when doing recon.
That's what I was hoping this was but it's just Talking Heads :<
Great input sharing..thanks!
Thanks ❤for amazing talk
Thankyou for these would really love if you can add getting into source code analysis into your videos list
Doing a CONNECTIVITY TEST on a Chromebook... Message recieved... CANT RESOLVE DNS FROM ANDROID APPS What do I need to do to fix this?.
Thanks ❤
Great talk from Shubs. Thank you
Awesome video Team💙
Congratulations! 🎉🎉
legend
Awesome content as always. where do you post questions?
Thanks! This was from a live event on LinkedIn Live. We hope to do more of them in the future.
Incredible work Adam!
We appreciate it!
Thanks for sharing!
Useful - new learning - nmap scan can lead to open port exploit - bug bounty
Thank you for sharing your knowlage!
The server status endpoint mentioned at 2:05, can anyone tell me what does it means ..like what kind of endpoints is it referring to?
Awesome <3
Your content is great, hope to get notification that u are back with new video 😅❤️
For some reason I am happy these videos are not seen enough
Dear Sir, Please do cover these crucial topics also. Like... How to bypass Drupal CMS How to bypass WAF protection that stops HTML, SQL, and XSS injection payloads? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc. How to bypass WAF using SQLMAP How to find hidden vulnerable parameters and endpoints inside the.js files? How to find hidden admin panels & cPanel and WHM panels. Please cover these important topics. Thanks
Awesome ^ ^
thx and subscribed
Thx
May God bless you with the happiness that you have been giving us since you were born. Happy birthday!
I did
Its worked MACos?
TNice tutorials was for 2 years
Nice
😂😂loved the pentesterlab code in frames
😍
1st viewer❤️❤️
Your videos are very informative and I really appreciate the way you're presenting each topic. It's great that you keep them short. Well done!
Lovely
Won't you cover your recent vulns?
As time passes, we'll cover more and more recent vulnerabilities. However, we have a huge backlog to get through :)
@@assetnote2016 don't you think it'd be better to rather mix up ? Like one old report and one newer report in a video of two reports
Was the JWT bug vulnerable only to that particular coupon page? Or was it affecting all the functionalities of the app, like for example, no proper JWT validation in user email changing function as well?
The JWT bug only allowed us to generate unlimited coupons, however the program still accepted this issue.
Is this s3 bucket misconfiguration vulnerability still relevant in 2022? I see no recent HackerOne reports in the hacktivity section. Hoping to receive your opinion on this. Great video btw.
It's still relevant! Even though AWS have introduced better security defaults for S3 buckets, policy mistakes happen all the time.
Thank you for another great video!