Using Chromedp to Hunt for Prototype Pollution @TomNomNom

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=hgrnoRTyZ88



Duration: 38:10
8 views
0


NahamCon 2021 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2023-06-28JWT jku&x5u = ❤️ by @snyff NahamCon2020
2023-06-28Owning Online Games with only Web Hacking Experience by @samwcyo NahamCon2020
2023-06-28Practical Attacks Using HTTP Request Smuggling by @defparam NahamCon2020
2023-06-28Scaling up Automated Attack Surface Discovery With Intrigue Core by @jcran NahamCon2020
2023-06-28Security Training at the Harbor Running CTFs with Docker by @ johnhammond
2023-06-28The Act of Balancing by @ChloeMessdaghi NahamCon2020
2023-06-28The Bug Hunter's Methodology v4 0 Recon Edition by @jhaddix NahamCon2020
2023-06-28The Pwning Machine, an Easy to Setup Pwning Station by @bitk NahamCon2020
2023-06-28Just Give me a Trial, Please samwcyo & sshell
2023-06-28Putting Your Mind to It Bug Bounties for 12 Months @zseano
2023-06-28Using Chromedp to Hunt for Prototype Pollution @TomNomNom
2023-06-28Why Do We Need A Hacker Community @STÖK
2023-06-281 Learn to Hack 2 Choose a Target 3 4 Get a Bounty @InsiderPhD
2023-06-28Amassive Leap in Host Discovery @ITSecurityGuard
2023-06-28Better Report Writing for Faster Triage Times @Farah Hawa
2023-06-28Bug Bounty Platforms Not Just for Hunting Anymore @PhillipWylie
2023-06-28Hacking IIS @infosec au
2023-06-28@gregxsunday Effectively finding vulnerabilities by debugging the source code
2023-06-28@infosec au Finding 0days in Enterprise Web Applications
2023-06-28@samwcyo Breaking Into Cloud Wallets 3 years spent Hacking Crypto Web Apps
2023-06-28@zseano Finding XSS on apple com and building a proof of concept to leak your PII



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering