Channel Avatar

Hacking Simplified @UCARsgS1stRbRgh99E63Q3ng@youtube.com

15K subscribers - no pronouns :c

Wanted to learn about hacking and cybersecurity ? You're at


Welcoem to posts!!

in the future - u will be able to do some more stuff here,,,!! like pat catgirl- i mean um yeah... for now u can only see others's posts :c

Hacking Simplified
Posted 2 years ago

10th May 2020. That's when it all started πŸ“Ή

Thanks to all of you πŸ™

A lot has changed since then.
Small improvements along the way.

14 - 13

Hacking Simplified
Posted 3 years ago

A 3 step process to finding and reporting critical secrets :



πŸ‘‡







1️⃣ Find secrets :



➑ Look into source control like Github, gitlab etc

Use github dorks for more directed searches. Like github.com/techgaun/github-dorks/blob/master/githu…



➑ Search for secrets in commit history and full organisation by trufflehog : github.com/trufflesecurity/trufflehog





➑ Try finding sonarqube or Jenkins instances. Use #shodan for that. Check my previous thread for some ideas around it πŸ˜ƒ : twitter.com/AseemShrey/status/1508059759491964928



Here's how I found one : aseem-shrey.medium.com/mind-your-logs-how-a-build-…





➑ Look into website's javascript files. Here's a writeup around the same : infosecwriteups.com/one-token-to-leak-them-all-the…





2️⃣ Verify those secrets :



➑ After you've found some secrets it's time to verify those. For each individual key look here : github.com/streaak/keyhacks



You can use the latest trufflehog v3 to automatically verify for over 600 types of secrets as well πŸ˜ƒ







3️⃣ Report πŸ’°



➑ Find the company's program on #hackerone or #bugcrowd or their own bug bounty page.



➑ If nothing like that exists, use connectbit to find contacts



➑ If even that doesn't help, check people on Linkedin or Twitter for that org



Here's a video of how to automatically find and verify secrets on github, s3 buckets etc using trufflehog v3 + an interview with the creator Dylan Ayrey







Go on and check the video here : https://www.youtube.com/watch?v=iqC-h... πŸ“Ή πŸš€







#cybersecurity #trufflehog #hackingsimplified

1 - 0

Hacking Simplified
Posted 3 years ago

New video, after a long time πŸš€
Another video in the 'Explained' series.

Will talk about :
➀ The spyware Pegasus
➀ Technical Capabilities
➀ How you can protect yourself from spywares

Let me know your thoughts on this
#pegasus #HackingSimplified

4 - 0

Hacking Simplified
Posted 3 years ago

Livestream on the channel :D

5 - 0

Hacking Simplified
Posted 3 years ago

🚨 Live Session Alert - 28th Aug Sat, 11 AM IST 🚨

If you want me to answer any questions, I will answer these in the QnA in the live session. Also any topic suggestions for the live session are highly welcome.

The recording will be on the channel, so you can ask the question now and view them later as well :D

forms.gle/V3Z12U66QJN5491ZA

5 - 1

Hacking Simplified
Posted 3 years ago

An interesting story, which looks straight from a spy movie, except that it's not.

Let's delve into #operationtrojanshield #OperationIronSide to know how criminals were hacked in one of the World's Largest Covert Operation conducted globally by FBI, AFP, EUROPOL


#cybersecurity #infosec #bugbounty #hacking

2 - 0

Hacking Simplified
Posted 3 years ago

1st in a series of videos, where I will talk about getting a job in cybersecurity. Specially in #India

This is mostly in Hindi, for people to get the most out of it

#bugbounty #cybersecurity #hackingsimplified

3 - 0

Hacking Simplified
Posted 3 years ago

Something's brewing β˜•

Will be up in about an hour.

*attention to detail*

20 - 2

Hacking Simplified
Posted 3 years ago

Just Published the 2nd part of Hacking Oauth : Flawed CSRF Protection - State Param


How easy it is to exploit 'state' param and do an account takeover.
Demo on medium[.]com

Learn More & Stay Safe.
#oauth #websecurity #hackingsimplified #BugBounty

2 - 0

Hacking Simplified
Posted 3 years ago

New Video Up : Hacking Oauth Applications - Pt. 1

In this video I walk you through What, Why & How of Oauth ?
And then look at some of the flows like authorization code grant and implicit grant. We close today's session by doing a hands-on with Portswigger lab on Implicit grant flow.

https://youtu.be/gVqrf2uUdQ0

#hackingsimplified #oauth #bugbounty

4 - 0