hello , what vulnerability should i search for after i select my target . and where do i start with .
Thisyou should start with ddos after you have vulnerability, with that you can start to hack them with ip attack
but really, run sqlmap on all endpoints, run masscan on all ports, use fofa to find more surface, and ffuf using seclists on the websites. if you find external vpn look for logs or 1day for service.
There are many great resources to learn from such as Jason Haddix [1] [2] and Zseano [3] Mehtodology, Bassterlord manuals [4] [5], Phineas Fisher HackBack DIY Guides [6] [7] [8] [9], some other breaches [10] [11] and Guacamaya HackBack videos [12] [13] and the Conti playbok [14] are a great start here.are there any tutorials out there , if they can you shred your light towards it bro?
Also you could go through his older posts, a lot of useful resources there and how to go about finding initial access, I learned a lot from his and other members like him who post guides and how to go about things on here.There are many great resources to learn from such as Jason Haddix [1] [2] and Zseano [3] Mehtodology, Bassterlord manuals [4] [5], Phineas Fisher HackBack DIY Guides [6] [7] [8] [9], some other breaches [10] [11] and Guacamaya HackBack videos [12] [13] and the Conti playbok [14] are a great start here.
[1][2][3] https://www.bugbountyhunter.com/methodology/zseanos-methodology.pdf
[4] BassterLord FishEye Networking Manual
[5] BassterLord Network Manual v2
[6] https://enlacehacktivista.org/images/6/69/Hack_back1.txt
[7] https://enlacehacktivista.org/images/a/a3/Hack_back2_en.txt
[8] https://theanarchistlibrary.org/library/subcowmandante-marcos-hack-back
[9][10] https://enlacehacktivista.org/libertycounsel.txt
[11] https://enlacehacktivista.org/images/8/8f/Flexispy.txt
[12] https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T
[13] https://kolektiva.media/w/9hvdC2ef18UNx1RSJxf1gi
[14] The Conti Play Book