BePractical
7.41K subscribers
232 photos
24 videos
6 files
395 links
If you have any doubts then email at faiyazahmad.online@gmail.com
Download Telegram
Just updated our channel theme! Let us know your thoughts on it
❀14πŸ‘1
What do you think of this new look?
Anonymous Poll
64%
Nice
22%
Not bad
14%
Previous one was better
❀5πŸ‘2
Channel photo updated
Hey everyone! I can’t believe I’m saying this, but we’ve just crossed over 21K subscribers on the channel! πŸŽ‰

Honestly, I’m so grateful to each and every one of you. Your support, comments, and just being here means the world to me. This journey has been an incredible ride, and I couldn’t have done it without you all cheering me on. Thank you for being part of this adventureβ€”I appreciate you more than words can say!
❀38❀‍πŸ”₯1πŸ”₯1πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Working on this new video! I am sure you all will love it....
πŸ”₯20❀1
Just finished up the video! Will be releasing tomorrow, I am pretty sure you all will learn something valuable from it
❀20
I still remember the time(2020)when I had no laptop/pc so I used to run kali linux on my Android device to learn hacking & pen testing.

And now, 4 years later: I have three awesome laptop with each of them hazing unique use cases!

(The one at the top is my first laptop and it is really priceless to me)

I would really like to thank God, my parents, all of my fellow subscribers on BePractical and telegram members here for supporting me throughout my journey! ❀️
❀59πŸ‘6πŸ‘6❀‍πŸ”₯1
Found XSS by bypassing the misconfigured CSP in one of the govt website of India!



Tip: Check out this new amazing tool that will be very useful in fuzzing interesting payloads, tags & events that will be useful when bypassing waf or csp (https://github.com/Asperis-Security/xssFuzz)
πŸ‘22πŸ‘1
#Discussion 1: How can you start in bug bounty?

(Comment down your thoughts on how can be begin the hunting journey & let's start discussion on it!)
πŸ‘9πŸ’‹1
This media is not supported in your browser
VIEW IN TELEGRAM
POV: It's late at night.. Your internet pack has just expired.. So you hacked your neighbors WiFi

#hackerman😎
😁19🀣6🐳2πŸ‘1πŸ”₯1
Discussion #2: Which is the tool that you commonly use when doing web recon?
(Comment it down below)
For me it's Ffuf
❀9πŸ‘1
Hi everyone! New video will be releasing tomorrow!(btw i have tried something new on this video so please let me know in the comments if this new format feels nice✌️)

Thanks for all your support!❀
❀11
Finally the video is uploaded! It will be published tomorrow between 11am IST to 12pm IST

Stay tunedπŸ˜‰
❀11πŸ‘6
Hi everyone, New video is out!
Check out how i was able to bypass content security policy(csp) on a live target!

Video Link: https://www.youtube.com/watch?v=Hz6zfXMdl54
❀12πŸ‘4
#Discussion 3:
You are given these two targets to find vulnerabilities

api.test.com (homepage returns 403)
test.com(returns a static web app)

What will be your methodology??

(Comment your approach below!)
❀8
This is crazy!!! I am really glad that you all are enjoying this video

Thank you all again for the love and support πŸ’ͺ
❀26πŸ₯°3
Two more bounties of this month!
❀29
Got invitation from a private program! They are really paying HUGGGEEEE bounty!!
😁33πŸ’©8πŸ‘4