Assetnote
Assetnote
  • 33
  • 40 033
Maximizing Security Outcomes: The Role of ASM in Bug Bounty Programs
Running an effective bug bounty program requires balancing an attractive scope and payout to hunters with an attack surface that challenges hunters to do more than automated scans. Program managers want to pay for skillful findings, not automated ones. In this episode, we talk about how ASM helps optimize your bug bounty program.
For more details about Assetnote's Attack Surface Management Platform, visit assetnote.io/
มุมมอง: 391

วีดีโอ

Internet-Wide Recon: Moving Past IP-Centric Approaches
มุมมอง 9312 หลายเดือนก่อน
In this episode, we discuss the blindspots of IP-centric approaches to asset discovery and the importance of understanding the full attack surface of an organization. We unpack the challenges posed by modern cloud architectures, load balancers, and WAFs, and how these can create blind spots in reconnaissance efforts. We also highlight the significance of subdomain data and passive DNS in uncove...
Beyond Shadow IT: Understanding the True Attack Surface of Your Software
มุมมอง 3463 หลายเดือนก่อน
This week's episode dives deep into the concept of shadow exposure and how it relates to third-party software, often overlooked in discussions about shadow IT. We explore the historical context of shadow IT, its evolution, and the real risks associated with widely deployed enterprise software that organizations may not fully understand. Join us as we discuss: - The origins and implications of s...
The Art of Recon: Strategies for Modern Asset Discovery
มุมมอง 6K3 หลายเดือนก่อน
Today, we explore the world of asset discovery and reconnaissance, particularly how these practices have evolved over time. Historically, discussions around reconnaissance have been overly simplistic and tool-centric, often focusing solely on the latest tools rather than the underlying principles and methodologies. Join us as we break down our approach to reconnaissance into five key elements: ...
The Unknown Complexities of DNS Resolution
มุมมอง 6513 หลายเดือนก่อน
In this episode, we dive into the technical complexities of DNS resolution in the context of ASM asset discovery. Join us as we discuss the challenges, implications, and solutions we have encountered while dealing with DNS resolution at scale. From DNS wildcards to security scanning considerations, we explore the importance of DNS data and its role in comprehensive reconnaissance. Our hosts, Mi...
Confusion in the Attack Surface Management Market - Surfacing Security Ep 6
มุมมอง 1K4 หลายเดือนก่อน
Confusion in the Attack Surface Management Market - Surfacing Security Ep 6
Uncovering Critical Vulnerabilities in Magento: A Deep Dive - Surfacing Security Ep 5
มุมมอง 4984 หลายเดือนก่อน
Uncovering Critical Vulnerabilities in Magento: A Deep Dive - Surfacing Security Ep 5
What is "True" Attack Surface Management (ASM)? - Surfacing Security Ep 4
มุมมอง 4554 หลายเดือนก่อน
What is "True" Attack Surface Management (ASM)? - Surfacing Security Ep 4
The Untold Story of Assetnote: Origins and Evolution - Surfacing Security Ep 3
มุมมอง 3714 หลายเดือนก่อน
The Untold Story of Assetnote: Origins and Evolution - Surfacing Security Ep 3
A Deep Dive into Three ServiceNow Vulnerabilities (with Adam Kues) - Surfacing Security Ep 2
มุมมอง 3224 หลายเดือนก่อน
A Deep Dive into Three ServiceNow Vulnerabilities (with Adam Kues) - Surfacing Security Ep 2
Chaining Three Bugs to Access All Your ServiceNow Data (Live Q&A) - Surfacing Security Ep 1
มุมมอง 9834 หลายเดือนก่อน
Chaining Three Bugs to Access All Your ServiceNow Data (Live Q&A) - Surfacing Security Ep 1
Bug Bounty Redacted #5: Second Order Subdomain Takeovers & Logic Bug DoS
มุมมอง 3.6K2 ปีที่แล้ว
Bug Bounty Redacted #5: Second Order Subdomain Takeovers & Logic Bug DoS
Bug Bounty Redacted #4: Writing to S3 buckets & Insecure JWT Implementation
มุมมอง 3.1K2 ปีที่แล้ว
Bug Bounty Redacted #4: Writing to S3 buckets & Insecure JWT Implementation
Bug Bounty Redacted #3: Hacking APIs & XSS, SQLi, WAF Bypass in a regional web application
มุมมอง 5K2 ปีที่แล้ว
Bug Bounty Redacted #3: Hacking APIs & XSS, SQLi, WAF Bypass in a regional web application
Bug Bounty Redacted #2: Third Party Subdomain Takeover & Exposed Admin Interfaces
มุมมอง 3.6K2 ปีที่แล้ว
Bug Bounty Redacted #2: Third Party Subdomain Takeover & Exposed Admin Interfaces
Bug Bounty Redacted #1: Exposed Redis and HAProxy
มุมมอง 6K2 ปีที่แล้ว
Bug Bounty Redacted #1: Exposed Redis and HAProxy

ความคิดเห็น

  • @Pop_Smart_Refer_API_CALL_Stack
    @Pop_Smart_Refer_API_CALL_Stack 26 วันที่ผ่านมา

    that monitor bend on shubs pov makes me wonder if he tilts his chair when he gets bored or gets really tired looking at the source code and debugging it all day or is it just a preference thing?

  • @ImKidriani
    @ImKidriani หลายเดือนก่อน

    You all are amazing

  • @hive9349
    @hive9349 หลายเดือนก่อน

    Every ep I watch, I have more questions than answers

  • @philippedelteil2489
    @philippedelteil2489 2 หลายเดือนก่อน

    With automation is possible to find impactful bugs🎉

  • @xscorp382
    @xscorp382 2 หลายเดือนก่อน

    Thanks for the video @Assetnote team. The wildcard DNS record issue is a very common yet important issue which is still unexplored by the security community. I was wondering how ASM companies that deal with multiple clients and run discovery scans on hourly basis solve this problem. In theory, there are couple of ways such as distinction between DNS records, response hash (in case fake subdomains respond with a web page) to filter out the fake subdomains but they never work in practical. Can you please shed some light on what are current good ways of atleast minimizing the number of fake subdomains and how companies in ASM market are doing this on scale?

  • @Jason.1734
    @Jason.1734 3 หลายเดือนก่อน

    Keep up the good work from Melbourne

  • @xB-yg2iw
    @xB-yg2iw 3 หลายเดือนก่อน

    This resonates with the recent CUPS vulnerabilities. Not that they weren't serious, but it seemed beforehand they were marketed like a 0-click rce on all Linux platforms

  • @davidwilkerson5265
    @davidwilkerson5265 3 หลายเดือนก่อน

    I think the comments misunderstand what these videos are for. They're opening discussion and centering it around the difference their product can make. They're not trying to secure you bug bounties.

  • @balaamuthan6408
    @balaamuthan6408 3 หลายเดือนก่อน

    Post videos by doing practically

  • @vaingyounj2173
    @vaingyounj2173 3 หลายเดือนก่อน

    I see Shubs I click

  • @crusader_
    @crusader_ 3 หลายเดือนก่อน

    More on this guys

  • @Bhaveshdewasi_1
    @Bhaveshdewasi_1 3 หลายเดือนก่อน

    :)

  • @fahad.1693
    @fahad.1693 3 หลายเดือนก่อน

    Guys this content is amazing, no doubt in that, but the audience will appreciate and benefit more from something practical like to show us the recon process and methods and other tricks you guys use when doing recon.

    • @3nertia
      @3nertia 3 หลายเดือนก่อน

      That's what I was hoping this was but it's just Talking Heads :<

  • @ri0tsun
    @ri0tsun 3 หลายเดือนก่อน

    Great input sharing..thanks!

  • @WebWonders1
    @WebWonders1 3 หลายเดือนก่อน

    Thanks ❤for amazing talk

  • @KiDR_IANI
    @KiDR_IANI 3 หลายเดือนก่อน

    Thankyou for these would really love if you can add getting into source code analysis into your videos list

  • @AMEER-114-
    @AMEER-114- 3 หลายเดือนก่อน

    Doing a CONNECTIVITY TEST on a Chromebook... Message recieved... CANT RESOLVE DNS FROM ANDROID APPS What do I need to do to fix this?.

  • @WebWonders1
    @WebWonders1 4 หลายเดือนก่อน

    Thanks ❤

  • @AliDeadpool-r5h
    @AliDeadpool-r5h 4 หลายเดือนก่อน

    Great talk from Shubs. Thank you

  • @KiDR_IANI
    @KiDR_IANI 4 หลายเดือนก่อน

    Awesome video Team💙

  • @Th3Mag1c1an
    @Th3Mag1c1an 4 หลายเดือนก่อน

    Congratulations! 🎉🎉

  • @21genhackers
    @21genhackers 4 หลายเดือนก่อน

    legend

  • @iloiskihailm8710
    @iloiskihailm8710 4 หลายเดือนก่อน

    Awesome content as always. where do you post questions?

    • @assetnote2016
      @assetnote2016 4 หลายเดือนก่อน

      Thanks! This was from a live event on LinkedIn Live. We hope to do more of them in the future.

  • @RespectableMan-ci2jb
    @RespectableMan-ci2jb 4 หลายเดือนก่อน

    Incredible work Adam!

    • @assetnote2016
      @assetnote2016 4 หลายเดือนก่อน

      We appreciate it!

  • @termireum
    @termireum 5 หลายเดือนก่อน

    Thanks for sharing!

  • @exploreThe_
    @exploreThe_ ปีที่แล้ว

    Useful - new learning - nmap scan can lead to open port exploit - bug bounty

  • @gosiekk13
    @gosiekk13 ปีที่แล้ว

    Thank you for sharing your knowlage!

  • @normalitee0os
    @normalitee0os ปีที่แล้ว

    The server status endpoint mentioned at 2:05, can anyone tell me what does it means ..like what kind of endpoints is it referring to?

  • @steiner254
    @steiner254 ปีที่แล้ว

    Awesome <3

  • @asaad0x
    @asaad0x ปีที่แล้ว

    Your content is great, hope to get notification that u are back with new video 😅❤️

  • @amit-mishra
    @amit-mishra ปีที่แล้ว

    For some reason I am happy these videos are not seen enough

  • @Free.Education786
    @Free.Education786 2 ปีที่แล้ว

    Dear Sir, Please do cover these crucial topics also. Like... How to bypass Drupal CMS How to bypass WAF protection that stops HTML, SQL, and XSS injection payloads? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc. How to bypass WAF using SQLMAP How to find hidden vulnerable parameters and endpoints inside the.js files? How to find hidden admin panels & cPanel and WHM panels. Please cover these important topics. Thanks

  • @CWLabs7209
    @CWLabs7209 2 ปีที่แล้ว

    Awesome ^ ^

  • @juancarbajal4502
    @juancarbajal4502 2 ปีที่แล้ว

    thx and subscribed

  • @usepbudi5779
    @usepbudi5779 2 ปีที่แล้ว

    Thx

  • @TymurMazur
    @TymurMazur 2 ปีที่แล้ว

    May God bless you with the happiness that you have been giving us since you were born. Happy birthday!

  • @Corvo-san4
    @Corvo-san4 2 ปีที่แล้ว

    I did

  • @linez4lifefanpage595
    @linez4lifefanpage595 2 ปีที่แล้ว

    Its worked MACos?

  • @gly1388
    @gly1388 2 ปีที่แล้ว

    TNice tutorials was for 2 years

  • @myfaveyoutube
    @myfaveyoutube 2 ปีที่แล้ว

    Nice

  • @th3r5n
    @th3r5n 2 ปีที่แล้ว

    😂😂loved the pentesterlab code in frames

  • @samindunimsara
    @samindunimsara 2 ปีที่แล้ว

    😍

  • @akashsarkar990
    @akashsarkar990 2 ปีที่แล้ว

    1st viewer❤️❤️

  • @sebastianwestberg1343
    @sebastianwestberg1343 2 ปีที่แล้ว

    Your videos are very informative and I really appreciate the way you're presenting each topic. It's great that you keep them short. Well done!

  • @etesttest2744
    @etesttest2744 2 ปีที่แล้ว

    Lovely

  • @crusader_
    @crusader_ 2 ปีที่แล้ว

    Won't you cover your recent vulns?

    • @assetnote2016
      @assetnote2016 2 ปีที่แล้ว

      As time passes, we'll cover more and more recent vulnerabilities. However, we have a huge backlog to get through :)

    • @crusader_
      @crusader_ 2 ปีที่แล้ว

      @@assetnote2016 don't you think it'd be better to rather mix up ? Like one old report and one newer report in a video of two reports

  • @SUMMedia
    @SUMMedia 2 ปีที่แล้ว

    Was the JWT bug vulnerable only to that particular coupon page? Or was it affecting all the functionalities of the app, like for example, no proper JWT validation in user email changing function as well?

    • @assetnote2016
      @assetnote2016 2 ปีที่แล้ว

      The JWT bug only allowed us to generate unlimited coupons, however the program still accepted this issue.

  • @SUMMedia
    @SUMMedia 2 ปีที่แล้ว

    Is this s3 bucket misconfiguration vulnerability still relevant in 2022? I see no recent HackerOne reports in the hacktivity section. Hoping to receive your opinion on this. Great video btw.

    • @assetnote2016
      @assetnote2016 2 ปีที่แล้ว

      It's still relevant! Even though AWS have introduced better security defaults for S3 buckets, policy mistakes happen all the time.

  • @raff000
    @raff000 2 ปีที่แล้ว

    Thank you for another great video!