Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть How I Found 5 Vulnerable Sony S3 Buckets | Sony S3 Bucket Misconfiguration

  • Cybrige
  • 2025-05-04
  • 686
How I Found 5 Vulnerable Sony S3 Buckets  | Sony S3 Bucket Misconfiguration
bug bounty sonyethical hacking sonysony s3 buckets3 bucket takeoveraws s3 misconfigurationbug bounty tutorialcybersecurity reconsubzy toolresponsible disclosurerecon for bug bountybug bounty indiaaws securitySony S3 Bucket MisconfigurationMy Bug Bounty StoryBug Bounty Win: Sony's Forgotten S3 BucketsI Reported a Sony AWS Flaw and Got SwagUncovering Sony's S3 Bucket VulnerabilityHacker Recon Story
  • ok logo

Скачать How I Found 5 Vulnerable Sony S3 Buckets | Sony S3 Bucket Misconfiguration бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно How I Found 5 Vulnerable Sony S3 Buckets | Sony S3 Bucket Misconfiguration или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку How I Found 5 Vulnerable Sony S3 Buckets | Sony S3 Bucket Misconfiguration бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео How I Found 5 Vulnerable Sony S3 Buckets | Sony S3 Bucket Misconfiguration

Support this channel: https://ko-fi.com/ciphervigil

What if I told you I discovered five exposed S3 buckets belonging to Sony—yes, that Sony—just by doing some smart recon and persistence?

In this video, I take you behind the scenes of how I uncovered misconfigured Amazon S3 buckets linked to Sony using tools like Subfinder, httpx, and Subzy, followed by good old-fashioned manual checking. One of those findings led to a real S3 bucket takeover (ethically, of course)—and I responsibly reported it to Sony.

They responded fast, fixed the issue, and even sent me some awesome swag as a thank-you! 🧑‍💻🎁

Whether you're into bug bounties, ethical hacking, or just curious about real-world recon techniques, this step-by-step breakdown will show you how powerful patience and passive recon can be.

🔍 Tools I Used:

Subfinder

httpx

Subzy

AWS Console

Manual Recon

📌 Topics Covered:

What are S3 Buckets?

What is a Bucket Takeover?

How Misconfigurations Happen

Real Recon Workflow

Responsible Disclosure Process

Lessons for Bug Bounty Hunters

📢 Don't forget to Like 👍, Comment 💬, and Subscribe 🔔 for more real-world ethical hacking stories and deep dives!
..........................................................................................................................................................................................................................................................

If you want to learn Ethical Hacking For Free In Hindi then this video will clearly explain you everything about the upcoming ethical hacking course.
.........................................................................................................................................................
Don't forget to subscribe to get further updates about upcoming course.

Ethical hacking :-    • Ethical Hacking  

Termux :-    • Termux Tutorial  

Kali linux :-    • Linux For Hacker  

Follow me on Instagram
👇👇👇👇👇👇👇👇👇👇👇👇👇👇
  / cryptos_ec  


Follow Me on Facebook Page
👇👇👇👇👇👇👇👇👇👇👇👇👇👇
  / cryptosecofficial  

Note : This video is only for Educational purpose, kindly do not misuse.
Thanks
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
▶ Stay Safe On Internet
▶ Stay Legal Always
▶ Videos On Cyber Security & Technology.
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Disclaimer -

video is for educational purpose only.Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
#Ethical​hacking #Cryptosec

Thankyou,
Cryptosec
LIKE | SUBSCRIBE | SHARE | COMMENTS



#BugBounty #EthicalHacking #S3BucketTakeover #CyberSecurity
#AWSHacking #SonySecurity #ResponsibleDisclosure #CloudSecurity
#HackerLife #BugBountyHunter #AWS #ReconTools #InfoSec
#S3Misconfiguration #RealWorldHacking

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]