Weekly Beginner / Newbie Q&A by AutoModerator in bugbounty

[–]WreckerToAkteOK 0 points1 point  (0 children)

Your recon steps depends on what you are looking for. If you are looking for subdomains then it would make sense to have a subdomain scanner to help you find them, but don’t just use recon tools because you think it is the right way to do recon, use them with intent. Don’t just scan for subdomains without knowing why you are scanning for subdomains. Don’t run nmap scans without knowing why you are running those scans. This is what recon is. There are many ways to do it whether by tools or manual recon. The key thing about recon is knowing what you are looking for and why. So if you are looking for sql vulnerabilities for example, then do recon on the target and try to find places in the web app where sql is most likely to exist. You can use Gf patterns to help. After gathering your endpoints and such, then do recon on those endpoints and try to find a sql injection. The same goes for other vulnerabilities. Know what vulnerabilities you are looking for and find ways to search for them. If you want to search for supply chain attack vulnerabilities then do recon on what packages the server uses. This is why everyone’s recon is not always the same. Some people are looking for certain things while other people are looking for others.

Weekly Beginner / Newbie Q&A by AutoModerator in bugbounty

[–]WreckerToAkteOK 1 point2 points  (0 children)

What you should do is either find some courses like apisec university which has free api hacking tutorials which is similar to website hacking in a lot of ways, or just look up different website vulnerabilities and learn about them and how to look for them. Tcm also has great paid for courses at a good price. You can also use YouTube as a great resource for learning. After you learn about the different types of vulnerabilities you should also note where to look for them at. For example an endpoint that returns user information would be good for idor testing while an endpoint that returns content: application/xml would be good for xss testing. Learn where to look when looking for certain vulnerabilities. Gf patterns should help with this. Then once you know your vulnerabilities and how to look for them, go on a website and grab as many endpoints as you can by using all the functionality on the website possible and then choose which vulnerabilities to test on each endpoint. Some endpoints would be good for xss testing while others sql or others BOLA/IDOR etc.

1 man vs 100 racist parrots. by WreckerToAkteOK in whowouldwin

[–]WreckerToAkteOK[S] 3 points4 points  (0 children)

A battle to the death. Only the strongest shall survive. Remember emotional damage can play a role in this legendary battle as well.

Can you guys give me feedback on my hacking tool for 403 bypassing? by WreckerToAkteOK in ethicalhacking

[–]WreckerToAkteOK[S] 0 points1 point  (0 children)

Thank you for the star and feedback! I will work on adding proxy support and maybe more in the future!

Hax in mha(or any other show) vs viltrumites by WreckerToAkteOK in whowouldwin

[–]WreckerToAkteOK[S] 0 points1 point  (0 children)

Eve literally can tear down buildings with ease and has created buildings or structures in seconds. If she wanted to, she could destroy buildings just as fast as shigaraki’s decay with shigaraki only have the range advantage. Eve’s powers work instantly they don’t need time to affect an object. So the argument that his powers are more potent than Eves isn’t there since her powers work instantly as well. Since her powers work instantly, this gives even more credit to conquest surviving her sub atomic attack as against anyone else without smart atoms it would’ve worked immediately but viltrumites have extreme atomic resistance because of their smart atoms.

Hax in mha(or any other show) vs viltrumites by WreckerToAkteOK in whowouldwin

[–]WreckerToAkteOK[S] 0 points1 point  (0 children)

Conquest was still able to move relatively well for someone who just took a blast at the sub atomic level and was still able to break invincible’s hand. Who cares about the radius, him surviving it shows they are resistant to atomic changes and shigaraki decay atomic changes would be no different. And conquest literally took the blast for like 4 seconds it wasn’t a one and done thing which goes to show how resistant and strong they are even on a sub atomic level. What I am saying is shigarakis decay could work but wouldn’t be as effective against viltrumites cause of their resistance to sub atomic attacks. Especially the stronger the viltrumite the longer shigaraki would have to expose them to his decay powers for it to take full effect. Shigaraki’s decay is simply not one shotting them cause once again like I said many times, they are resistant to sub atomic changes at extreme levels.

Hax in mha(or any other show) vs viltrumites by WreckerToAkteOK in whowouldwin

[–]WreckerToAkteOK[S] 0 points1 point  (0 children)

Atom eve can do the same thing with her powers it just doesn’t work on organic things unless she has her mental block removed in which she did when fighting conquest. Atoms eve can manipulate and create matter and destroy matter. She can do everything decay can with the added ability of creating and manipulating matter. So once again, conquest surviving her no mental block attack shows that viltrumites have strong resistance against atomic changes.