- Hive Five
- Posts
- NahamSec interview Naffy
NahamSec interview Naffy
Photo by Will Francis / Unsplash
Note that during these interviews I also moderate thus quality may vary.
PROFILE
10yrs hacking
bug bounty X
has oscp, respectable standard
coding: ghetto bash, curl
TIPS
mentors, whoâs in your corner and who can you communicate with
friendly helpful competition with peers
surround yourself with people that have the qualities you wish to attain
be an autodidact, ie. self teach to an extent
put the time in ~8+ hours a day, ie. bruteforce while watching Adventure Time
no one can teach you the practical skills, ie. experience
canât be single-minded, ie. get a multiple of your time
always have multiple irons in the fire
multiple censys account to avoid x
donât rely on tools, could have skewed results. E.g. screenshots cannot appropriately display underlying content, errors and functionality.
user correct host header, cname in host header
reading RFCâs and leveraging that knowledge a la Inti
requests are free
vhost scan
everything youâre doing is to extend your attack surface
discovery > web skills
fuzz interesting things
ROUTINE
wake up, coffee
6-7 Verizon hosts of interest found over night
nmap 80,443,xxx,xx
based on that look for target to hit
shodan, censys, xx over night look for interesting
brute force those hosts
hack those if anything interesting
WORKFLOW
Automation = dns resolution
donât rescan, assume assets donât change every X week
nmap nmap -T 4 -iL hosts -Pn --script=http-title -p80,4443,4080,443 --open
filter out new stuff
burp
run scan
fuzz while scan is running
intruder
TOOLS
nmap
amass
ffuf
COLLABORATION
Would like to collab with agarri
Shout out to shubz, x, green hat hackers