Hack for Fun and Profit

Follow Hack for Fun and Profit
Share on
Copy link to clipboard

Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe

thehackerish


    • Dec 29, 2021 LATEST EPISODE
    • infrequent NEW EPISODES
    • 12m AVG DURATION
    • 11 EPISODES


    Latest episodes from Hack for Fun and Profit

    Certified Red Team Operator Review

    Play Episode Listen Later Dec 29, 2021 11:14


    In this episode, I will give you my honest review of CRTO (certified red team operator certification) from Zeropoint Security. Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-10-lab-vm-free Read more on the blog: https://thehackerish.com Support this work: https://thehackerish.com/how-to-support Awesome collection of well-known Active Directory attacks: https://attack.stealthbits.com The bible of Active Directory hacking: https://adsecurity.org Pentester Academy Lab with walk-through: https://www.pentesteracademy.com/activedirectorylab Facebook Page: https://www.facebook.com/thehackerish Follow us on Twitter: https://twitter.com/thehackerish

    JavaScript Enumeration for bug bounty hunters

    Play Episode Listen Later Dec 24, 2020 10:55


    JavaScript Enumeration is a critical skill to have if you want to level up your penetration testing or bug bounty hunting game. Yet, not everyone does it, partly because it is a boring exercise or it consumes most of your time, not to mention how intimidated you might feel reading someone else's code. Today, we will explore this topic and understand why it matters, and how you can perform it. Further reads mentioned in the video: https://thehackerish.com/cross-site-scripting-xss-explained/ https://portswigger.net/web-security/cross-site-scripting/dom-based https://labs.detectify.com/2016/12/15/postmessage-xss-on-a-million-sites/ https://medium.com/@alex.birsan/the-bug-that-exposed-your-paypal-password-539fc2896da9 Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-10-lab-vm-free Read more on the blog: https://thehackerish.com Facebook Page: https://www.facebook.com/thehackerish Follow us on Twitter: https://twitter.com/thehackerish

    OSCP Certification: All you need to know

    Play Episode Listen Later Jul 30, 2020 14:13


    Hello ethical hackers! In this episode, you will learn everything related to OSCP certification. What is OSCP? Why is it a strong certification? What sets it apart? What are the requirements? How to properly prepare for the exam? What to do the day of the exam? And what's next once you earn your OSCP certification? Read more on the blog: https://thehackerish.com/oscp-certification-all-you-need-to-know/ https://thehackerish.com/best-hacking-websites-for-ethical-hackers/ Hacking websites to sharpen your skills: https://youtu.be/iZLo8WiooIY Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-10-lab-vm-free Facebook Page: https://www.facebook.com/thehackerish Follow us on Twitter: https://twitter.com/thehackerish

    From a lame SSRF to a full $4000 RCE

    Play Episode Listen Later Jul 5, 2020 9:49


    Hello ethical hackers and bug bounty hunters! Welcome to this bug bounty write-up where I show you how I found a Server-Side Request Forgery vulnerability (SSRF). Then, I will explain how I was able to escalate it to obtain a Remote Code Execution (RCE). Finally, you will see how it is possible to gain a full SSH shell on the vulnerable server. If all this seems intimidating for you, let me tell you that shouldn't be; just make sure you stick with me until the end. I promise you are going to learn many things today! Read more on https://thehackerish.com/bug-bounty-write-up-from-ssrf-to-4000/ Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-10-lab-vm-free Facebook Page: https://www.facebook.com/thehackerish Follow us on Twitter: https://twitter.com/thehackerish

    Hacking a new web application from start to finish

    Play Episode Listen Later Jun 4, 2020 15:34


    Hello ethical hackers and bug bounty hunters! I've recently conducted a successful penetration testing against a web application built using Google Web Toolkit, and I want to share with you the process I followed and the bugs I found. Hopefully, this episode will inspire you to try harder during your own bug bounty hunting and penetration testing journey. I will briefly explain what Google Web Toolkit is and what research has already been made around it. Then, I will explain why and how I built a Burp extension to help me during the penetration testing process. Finally, I will share with you some vulnerabilities I found, especially a cool one which required further effort. So stay with me as we smash this web application into pieces! Read more details on https://thehackerish.com/hacking-a-google-web-toolkit-application/ Watch the Broken Access Control approach on https://youtu.be/TJQpOrtet8E Read about IDOR on https://thehackerish.com/idor-explained-owasp-top-10-vulnerabilities/

    Bug bounty tools you should start using!

    Play Episode Listen Later May 27, 2020 13:13


    Hello ethical hackers and welcome to the world of hacking and bug bounty hunting. Today, I will share the tools I use to gather open source intelligence and perform subdomain enumeration. Every craftsman has its toolbox and a bounty hunter is no different. However, it's easy to get lost in the growing number of bug bounty tools which get published by the community everyday. That's why one of the goals of this article is to provide you with the minimal tools which provide the maximum returns. Links to all the tools are available on the blog post on: https://thehackerish.com/bug-bounty-tools-from-enumeration-to-reporting/

    This is how you write bug bounty reports that stand out!

    Play Episode Listen Later May 7, 2020 15:23


    Hello dear ethical hackers and welcome to this new article about bug bounty hunting. In this episode, you will discover my report template and learn how you can write outstanding bug bounty reports which you will be proud of. If you've been following along from the beginning, you have hopefully found at least one bug by now. If it's the case, then congratulations! Now it's time to report that bug right? Well, I have been working as a triage Analyst for more than a year, and trust me when I tell you that only few hunters master the art of writing good bug bounty reports. If you don't give enough care and love when writing, be aware that it is a mandatory soft skill which brings you higher bounties. Every hunter should know how to write good bug bounty reports. And today, you will see how you can do just that! Read more on https://thehackerish.com Follow us on Twitter: @thehackerish Watch videos on Youtube: https://www.youtube.com/channel/UCIXot2vRgeM5alhAlpTbhQA

    My bug bounty methodology and how I approach a target for the first time

    Play Episode Listen Later Apr 30, 2020 18:16


    Welcome again to the Hack for Fun and Profit podcast, where we explore topics related to cyber security and bug bounty hunting. Last time, I showed you the best resources I use to stay up to date in bug bounty hunting. Today, I will share with you my bug bounty methodology when I approach a target for the first time. This is going to be divided into several sections. First, I will show how I choose a bug bounty program. Then, I will dive into how I enumerate the assets. From there, I will explain how I pick a web application and how I test it. Finally, I will evaluate this bug bounty methodology by enumerating its pros and cons so that you know exactly what to expect from it. There are plenty of bug bounty tips and tricks along the way, so make sure to stick around until the end. Learn the OWASP Top 10 on the blog: https://thehackerish.com Watch our videos on Youtube: https://www.youtube.com/channel/UCIXot2vRgeM5alhAlpTbhQA Follow us on Twitter: https://twitter.com/thehackerish

    Bug bounties: Burnout and your mental health

    Play Episode Listen Later Apr 12, 2020 14:31


    Hello ethical hackers, today we explore what causes burnout and suggest ways to heal from it and preserve your mental health while still doing what you're passionate about: Hacking! As a side note, although burnout and depression share some symptoms, they are different. If you suffer from depression, you should visit a mental health professional. These suggestions reflect what worked with my own burnout experience. They are not based on scientific facts and don't replace your doctor's intervention. If you'd like to visit the references mentioned in this episode, head to our blog post at https://thehackerish.com/bug-bounty-burnout-and-your-mental-health/

    Bug bounty hunting bird' eye view and realistic expectations

    Play Episode Listen Later Apr 5, 2020 17:12


    Imagine a world where companies come to you and ask you to hack them. In return, they will pay you whenever you find a unique vulnerability. And the best part, you don't have to leave your home! It sounds unrealistic right? Well, let me tell you that it's now a real job, not a fantasy anymore with the rise of bug bounty hunting! In this episode, we will explore the history of the bug bounty career, understand its ecosystem, analyze its benefits and talk about some of its drawbacks.

    The podcast in a nutshell

    Play Episode Listen Later Apr 2, 2020 0:58


    This is an introduction of the Hack for Fun and Profit Podcast.

    Claim Hack for Fun and Profit

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel