Computer NetworksNETWORKS

Mind blowing 🤯 $20 million USD bounties! (Zero to Hero Money Hacking Roadmap)

Stephen Sims shares his years of experience with us and shows us how we can make money hacking. But be careful – some of the options are not recommended.

// Stephen’s Social //
YouTube: https://www.youtube.com/@OffByOneSecurity/streams
Twitter: https://twitter.com/Steph3nSims

// Stephen Recommends //
Programming Tools:
Online Compiler, Visual Debugger, and AI Tutor for Python, Java, C, C++, and JavaScript:
https://pythontutor.com/

PyCharm – Python IDE with Great IDA Pro Support:https://www.jetbrains.com/pycharm/

VS Code:https://code.visualstudio.com/

Patch Diffing:
Windows Binary Index for Patch Diffing:https://winbindex.m417z.com/

BinDiff Tool for IDA Pro, Ghidra, or Binary Ninjahttps://www.zynamics.com/bindiff.html

Diaphora Diffing Tool for IDA Prohttp://diaphora.re/

PatchExtract for Extracting MS Patches from MSU Formathttps://gist.github.com/wumb0/306f97dc8376c6f53b9f9865f60b4fb5

Vulnerable Things to Hack
HackSys Extreme Vulnerable Driver:https://github.com/hacksysteam/HackSysExtremeVulnerableDriver

WebGoat – Deliberately Insecure Application:https://owasp.org/www-project-webgoat/

Damn Vulnerable Web App:https://github.com/digininja/DVWA

Buggy Web App:http://itsecgames.com/

Gruyere Cheesy Web App:https://google-gruyere.appspot.com/

Metasploitable:https://sourceforge.net/projects/metasploitable/files/Metasploitable2/

Damn Vulnerable iOS App:https://resources.infosecinstitute.com/topics/application-security/getting-started-damn-vulnerable-ios-application/

OWASP Multillidae:https://github.com/webpwnized/mutillidae

Online CTF’s and Games:
SANS Holiday Hack 2023 and Prior:https://www.sans.org/mlp/holiday-hack-challenge-2023/ https://www.holidayhackchallenge.com/past-challenges/

CTF Time – A great list of upcoming and previous CTF’s!:https://ctftime.org/

YouTube Channels:
https://www.youtube.com/@davidbombal
https://www.youtube.com/@NahamSec
https://www.youtube.com/@OffByOneSecurity
https://www.youtube.com/@_JohnHammond
https://www.youtube.com/@ippsec
https://www.youtube.com/@LiveOverflow/videos

Free Learning Resources:
SANS Free Resources – Webcasts, Whitepapers, Posters & Cheat Sheets, Tools, Internet Storm Center:https://www.sans.org/security-resources/

Shellphish – Heap Exploitation:https://github.com/shellphish/how2heap

Exploit Database – Downloadable Vulnerable Apps and Corresponding Exploits:https://www.exploit-db.com/

Google Hacking Database (GHDB):https://www.exploit-db.com/google-hacking-database

Google Cybersecurity Certificate:https://grow.google/certificates/cybersecurity/#?modal_active=none

Phrack Magazine:http://www.phrack.org/

Kali Linux:https://www.kali.org/get-kali/#kali-platforms

Slingshot Linux:https://www.sans.org/tools/slingshot/

Books & Articles:
Gray Hat Hacking Series: https://amzn.to/3B1FeIK
Hacking: The Art of Exploitation: https://amzn.to/3Us9Uts

A Guide to Kernel Exploitation: https://amzn.to/3vfY8vu

Smashing the Stack for Fun and Profit – Old, but a classic:https://inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf

Understanding Windows Shellcode – Old, but still good:https://www.hick.org/code/skape/papers/win32-shellcode.pdf

Great list of exploitation paper links from Shellphish!:https://github.com/shellphish/how2heap#other-resources

// Stephen’s previous videos with David //
Free Exploit development training (beginner and advanced) https://youtu.be/LWmy3t84AIo

Buffer Overflow Hacking Tutorial (Bypass Passwords): https://youtu.be/c2BvS2VqDWg

// David’s SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X / Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// SPONSORS //
Interested in sponsoring my videos: sponsors@davidbombal.com

// MENU //
00:00 – Coming Up
00:00 – Intro
01:11 – Stephen’s Experience
03:10 – How to Change Careers
05:39 – How do I Become an Expert?
08:01 – Cyber Crime
12:47 – Ransomware
16:42 – Ransomware with A.I
23:15 – Bug Bounties & Disclosures
28:22 – Web Bug Bounties
33:45 – Binary Exploitation
41:18 – Patching and n-Day Exploits
48:56 – What is the Patch Level in the Target Org?
51:47 – Diffing Example
55:40 – Professional Services
01:03:34 – Exploit Sales Considerations
01:13:07 – The Golden Era of Hacking
01:15:00 – Zero to Hero
01:27:01 – OffByOneSecurity
01:37:42 – Conclusions
01:39:43 – Outro

apple
ios
android
samsung
exploit
exploit development
zero day
0day
1day
dark web
microsoft
macos
apple
linux
kali linux

Disclaimer: This video is for educational purposes only.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#android #ios #hacker

source

cisco academie

42 thoughts on “Mind blowing 🤯 $20 million USD bounties! (Zero to Hero Money Hacking Roadmap)

Comments are closed.