LunaNotes

Download Subtitles for My Friend's $40,000 Claude Code Video

My Friend Made $40,000 Using Claude Code (Here's How)

My Friend Made $40,000 Using Claude Code (Here's How)

NahamSec

1023 segments EN

SRT - Most compatible format for video players (VLC, media players, video editors)

VTT - Web Video Text Tracks for HTML5 video and browsers

TXT - Plain text with timestamps for easy reading and editing

Subtitle Preview

Scroll to view all subtitles

[00:00]

This is Douglas and he has recently made

[00:02]

over $40,000 at a live hacking event

[00:05]

with Hacker 1 simply by using Cloud Code

[00:07]

and some of his custom skills that he

[00:09]

has created based on his reports on

[00:11]

Hacker 1. But before we get into this, I

[00:13]

want to quickly just announce what I'm

[00:15]

going to be doing moving forward with

[00:16]

these types of series. And honestly,

[00:18]

I've been seeing a lot of people create

[00:19]

their own Claude skills and using them

[00:20]

to make money, and I wanted to learn how

[00:22]

to do it. So, moving forward, I'm going

[00:23]

to try and make a couple of videos

[00:25]

around making your own skills or maybe

[00:27]

even bring in some other guests onto the

[00:28]

channel and having him share the screen

[00:30]

like today's episode and showing us how

[00:32]

to do it. But before we do this, do me a

[00:33]

favor, drop me a comment saying,

[00:34]

"Claude, if you want me to make a video

[00:37]

on creating our first Claude skill using

[00:39]

just public data that's out there on the

[00:41]

internet and then testing it out and

[00:42]

seeing if it finds vulnerabilities or

[00:43]

not. So, all you have to do is drop a

[00:45]

comment saying Claude and I will make

[00:46]

that for one of the upcoming videos. But

[00:48]

for now, let's jump into the video with

[00:49]

Archangel and see how he's using Claude

[00:52]

to find vulnerabilities on his bug

[00:54]

bounty targets. All right, man. Show me.

[00:56]

I know you've been building a lot of

[00:57]

cool stuff using AI and I know we you

[01:00]

and I were talking earlier and you

[01:01]

mentioned you use cloud or you know you

[01:04]

make your skills to hack on these

[01:06]

different programs. First of all, how

[01:08]

did you make these skills? Like give me

[01:09]

the structure behind the skills. How

[01:11]

does that look? What I did was at the

[01:14]

recommendation of some other hackers, I

[01:15]

took uh an export of all of my reports

[01:18]

on hacker one. Um, I think I just gave

[01:21]

Claude my hacker one API token and told

[01:23]

it to download all my reports. And then

[01:25]

I just gave it the instruction to build

[01:27]

uh skills um based on what it noticed in

[01:31]

my like 2000 something reports so that

[01:34]

anytime I spin up a cloud session, it

[01:36]

knows the types of vulnerabilities I'm

[01:38]

looking for, how to exploit them. And

[01:40]

then the the nifty part is that it can

[01:42]

grow, right? like as I report more and

[01:44]

more vulnerabilities, I can have it just

[01:46]

like refresh the skills based on these

[01:47]

new reports that have come in. Any

[01:49]

collabs that I do, like I have a couple

[01:50]

of collabs with um like with Alex

[01:52]

Chapman, uh with with you, with other

[01:56]

just high-profile hackers and so if I've

[01:58]

got those reports in my inbox, then uh

[02:00]

Claude is able to see them and I can

[02:02]

build skills based off of off of those

[02:04]

uh those reports as well.

[02:06]

>> Um

[02:06]

>> and then you use all these skills, the

[02:08]

same skills across all the programs, but

[02:10]

how do you customize this based on each

[02:12]

program? How does that work?

[02:13]

>> Yeah. So, so I've got a a blanket uh

[02:16]

like default agent file that I've I've

[02:19]

created that I'll uh I'll use whenever I

[02:22]

start any any program. Um however, as as

[02:26]

I get more involved in the program and

[02:28]

Claude learns about the the different

[02:30]

scope, um it can update its memory um to

[02:33]

so it's not going to update its

[02:34]

individual agent file, but it'll update

[02:36]

its memory file to know what is

[02:38]

important to this to this particular

[02:40]

program. So, for example, when hacking

[02:42]

on the uh Amazon VRP uh program,

[02:46]

uh like I really really like to find XSS

[02:49]

because they pay well. Um and so uh in

[02:52]

the in my Amazon directory, I'll have

[02:54]

the agent might have a a note in its

[02:56]

memory file saying really target um

[02:59]

cross-ite scripting vulnerabilities, one

[03:01]

because they're more common in this

[03:02]

program, but also because they pay well.

[03:05]

whereas another program might not pay uh

[03:07]

might not pay that much or might not be

[03:09]

interested in in XSS at all just because

[03:11]

it requires uh user interaction.

[03:14]

>> So you're heavily giving this a

[03:16]

framework per program like look for excs

[03:18]

for this one or this company may be

[03:20]

notorious for idors. So it also

[03:22]

prioritizes these vulnerabilities that

[03:24]

are worth it for these bug binding

[03:25]

programs versus the ones that may not

[03:27]

care for the same vulnerabilities. So

[03:29]

the structure is based on v type and

[03:32]

impact per program.

[03:33]

>> Yeah, exactly. Uh, but that that only

[03:35]

works if you have a good agent file to

[03:36]

begin with. Um, like if I were if I were

[03:38]

to just take out of the box cloud code,

[03:40]

then I'd have to wrestle with it every

[03:41]

single time that I start up a new

[03:43]

session telling it, okay, you're a bug

[03:44]

bounty hunter. We're going for impact

[03:47]

here, not just uh not just for

[03:50]

vulnerabilities if we're we in a pen

[03:52]

test. Because cloud code what it

[03:53]

sometimes does unless you tell it

[03:55]

specifically like you are a bug bounty

[03:57]

hunter is it'll like it'll focus on

[03:59]

things that don't have a lot of impact

[04:01]

or are just like defense and depth

[04:03]

misconfigurations or things that you

[04:06]

know like you and I know a program would

[04:08]

never pay for. Um so for example like

[04:09]

cores misconfigurations

[04:11]

um or theoretical vulnerabilities or

[04:14]

vulnerability which isn't exploitable

[04:16]

now but then may be exploitable in the

[04:18]

future like no program is going to pay

[04:19]

for those. Um, but cloud code, unless

[04:22]

you tell it otherwise, it like in your

[04:24]

initial agent file, it's going to focus

[04:25]

on those and, you know, give you that

[04:26]

big like jackpot or critical

[04:28]

vulnerability found, and you're going to

[04:30]

have to kind of steer it away from those

[04:31]

and coach it. Um, and so just to like

[04:34]

avoid that, um, you can create a a very

[04:37]

detailed um, and this we're spending the

[04:40]

tokens on, creating a very detailed

[04:42]

agent file so that you can just ignore

[04:44]

those from the offset. Um, and then so

[04:47]

what I do, I've got this I've got this

[04:49]

agent file which I u which I'll create

[04:51]

in every single directory um that I'm

[04:53]

that I'm hunting in. So um for example,

[04:56]

I'm not sure if my screen's being shared

[04:57]

now, but if I wanted to like hunt say uh

[05:00]

on John Deere's uh uh BDP, I could just

[05:04]

say I just say hunt John Deere

[05:08]

and then it creates a uh a t right

[05:11]

creates a John Deere directory in my

[05:13]

targets folder. Um, and if we ls, we've

[05:16]

got my claude agent file hidden here, or

[05:18]

which will tell Claude the the general

[05:20]

types of vulnerabilities that I like to

[05:22]

hunt for and uh the reason the reason

[05:25]

why we need to go for impact and not

[05:26]

just not just blanket vulnerabilities.

[05:28]

>> So, hunt is just an alias and that alias

[05:30]

does the copying your agent file,

[05:33]

creating the folders and the structure

[05:34]

around everything else.

[05:35]

>> Yeah, that's right. It's like it's just

[05:36]

like a four-line alias.

[05:37]

>> Where do you import your skills? How do

[05:39]

you import your skills? Where do those

[05:40]

come to play? So yeah, I put my skills

[05:43]

in the just like home directoryskills.

[05:47]

Yeah. So I've got like a a fuff skill

[05:49]

which I just uh copied from um Joseph

[05:52]

Thacker's uh GitHub. So shout out to

[05:54]

him. I got like a hunt at skill, hunt

[05:56]

blind xss, which has my uh which has my

[05:59]

blind xs payload. I've got a report

[06:02]

writing skill. Um and then yeah, just a

[06:04]

different type of skill for every single

[06:06]

type of vulnerability I might be looking

[06:07]

for. Um, and then so for example, if we

[06:10]

wanted to just like I'll just do like u

[06:14]

hunt a hunt rcce.

[06:17]

>> So I'm assuming with the skill and the

[06:18]

reports the reports are all the reports

[06:20]

that were RC related and then you

[06:22]

imported those into the markdown file

[06:24]

and then skill.md is how you verify and

[06:27]

look for these different RC's, right?

[06:29]

>> Yeah, that's exactly right. So I'll go

[06:30]

ahead and cat skill.md right now. Um,

[06:32]

and so if we look at it, we can see not

[06:35]

go up too far. There's a description of

[06:37]

the skill, but then you're you're

[06:39]

assisting Archangel hacker one. Use RC

[06:40]

report blah blah blah blah. Um, and then

[06:43]

RC, it tells it basically how important

[06:45]

it is. RC is the holy grail and bug

[06:47]

bounty. If you ever get this, look for

[06:49]

this. Then we've got a number of uh

[06:51]

different chains we can follow. Um,

[06:53]

things to look out for um CVES that

[06:56]

might be uh that might be useful, etc.

[06:59]

And then we just it goes down the entire

[07:01]

uh the entire skill um with the impact

[07:04]

um and then different things to

[07:05]

consider. So and the same thing can uh

[07:08]

we can look at the same thing for the

[07:09]

fuff one, right? So go cd fuff and this

[07:13]

is on uh just Joseph actor's github. So

[07:16]

this is you can go and look at the skill

[07:18]

yourself over uh over there. Let's go

[07:21]

ahead and ck skill.md.

[07:23]

>> So it's pretty much a how to use fuff

[07:26]

and knows exactly what to do. Yeah.

[07:27]

Yeah. Yeah. Exactly. Exactly. So it

[07:29]

gives it there's lots of examples

[07:30]

because I mean cloud code it's a you

[07:33]

know it's just

[07:36]

you're explaining to it using natural

[07:38]

language and so the more context you can

[07:39]

give it around not only what to do but

[07:41]

why to do it it's going to it's going to

[07:43]

perform better. So so any yeah those are

[07:46]

those are skills those are skills I've

[07:47]

given it. Um I can add more skills as I

[07:50]

as I find more types of vulnerabilities.

[07:51]

In fact I've got a couple on on my back

[07:53]

burner that I've been waiting to I've

[07:55]

been waiting to write. But if you want

[07:57]

to go back to my targets directory,

[08:01]

uh John Gear,

[08:04]

then yeah, so we've we've got uh we've

[08:06]

got my claude MD, which is my agent

[08:08]

file, which basically I I use to tell

[08:12]

Claude that uh you're not a pentester.

[08:15]

Uh you are a bug bounty hunter. And so

[08:17]

we always go for impact. Always impact.

[08:20]

Always impact. Always impact. And I

[08:22]

still even even with this agent file, I

[08:23]

sometimes have to remind Claude that

[08:26]

that we're going for impact. Um, and not

[08:28]

just going for for vulnerabilities that

[08:30]

that nobody cares about. Um, and it uh

[08:34]

it also prevents or having this agent

[08:37]

file also prevents uh me from having to

[08:39]

explain and justify my activity to

[08:41]

Claude because by default it'll be like

[08:43]

you can't uh you can't perform this uh

[08:46]

this activity because it's you know

[08:48]

against my ethical boundaries or

[08:50]

whatnot. But if it knows ahead of time

[08:52]

that you're a bug bounty enter and this

[08:53]

is an authorized engagement, you just

[08:55]

get to avoid having to to work around

[08:57]

that entirely.

[08:58]

>> This is great. It seems like it's like

[08:59]

automation built on crack at this point,

[09:02]

right? It's like it's even better than

[09:03]

automation because you're no longer just

[09:06]

automating your recon, but you can also

[09:08]

offload all your findings or at least

[09:09]

like the low hanging fruits that you

[09:11]

would look for easily and maybe even

[09:13]

miss sometimes, right? Because you're

[09:14]

not testing every parameter, every entry

[09:15]

point. You can have Cloud do it. How

[09:17]

much have you made using Cloud Skills in

[09:20]

the last, let's say, 90 days of doing

[09:22]

this?

[09:23]

>> 90 days is tough to say, but I can tell

[09:25]

you that at the last live hacking event,

[09:27]

um, I used Cloud Code entirely. I

[09:29]

basically just used Cloud Code, um, and

[09:33]

made between 40 and 50,000.

[09:36]

>> Holy dude. Congrats. That's

[09:37]

awesome.

[09:38]

>> Yeah. Yeah. And and not only does it

[09:40]

help you find those low hanging fruits,

[09:42]

but it it helps you test things that are

[09:44]

normally a pain to to test manually. So

[09:47]

for example, one of my vulnerabilities

[09:48]

that I I found during the the last lab

[09:51]

packet event I had to do some like web

[09:53]

hook manipulation and like nobody wants

[09:55]

to set like write a Python script to

[09:57]

make a web hook connection and then mod

[09:58]

make modifications dur while the

[10:00]

connection's open but cloud code can

[10:02]

just do it you know within like a couple

[10:05]

seconds and so just being able to to

[10:07]

quickly tell cloud code you know we've

[10:10]

got this web hook connection here's a

[10:11]

bug I want to try using that web hook

[10:13]

connection do it it just like saves so

[10:15]

much time so much time and I I was able

[10:16]

to find bugs that nobody else like even

[10:18]

looked for because I was doing things

[10:20]

that no manual hunter would want to do.

[10:22]

>> Yeah. I mean, it's it's a lot of grunt

[10:23]

work, right? It's a lot of setting up,

[10:25]

modifying, understanding things, and

[10:27]

then going back and forth, and they

[10:29]

could just do that in parallel a lot

[10:30]

easier. But can we see this in action?

[10:33]

Can you maybe do a little bit of uh

[10:35]

using your skills to do some stuff? We

[10:37]

can use John Deere as a program like you

[10:39]

have it right now.

[10:40]

>> Sure. So, let's go ahead and say uh so

[10:44]

we're in our John Deere directory. We

[10:45]

don't have any uh any customizations.

[10:47]

This is just cloud code out of the box

[10:49]

with my agent file. So I'll say like

[10:51]

claude and then I'll do the dangerously

[10:54]

skip permissions for the purpose of this

[10:55]

demonstration. Don't recommend it. Um

[10:58]

but uh I don't want to be flicking

[11:02]

through a bunch of like yes no prompts

[11:04]

uh while on stream. Um

[11:08]

and yes, I trust this holder. Okay, so

[11:10]

we're in cloud right now. We're in for

[11:12]

Yeah, we're in cloud code. We can say um

[11:16]

our target is currently John Deere via

[11:22]

um John Deere's

[11:25]

public uh BDP located on hacker 1. Um

[11:30]

now in this if we had a particular uh

[11:32]

application that we were looking to test

[11:34]

um we might do that. But let's say we're

[11:36]

let's say we're not actually sure what

[11:37]

we want to test. I'm not sure what part

[11:40]

of the scope I want to test, but I know

[11:45]

John Deere really cares about

[11:48]

acquisitions.

[11:50]

Um, can you find any niche acquisition

[11:54]

domains that uh we may start looking on?

[11:59]

And then it's going to run for uh for a

[12:02]

minute.

[12:02]

>> How many tokens are you burning through?

[12:04]

Is it just one cloud max or do you have

[12:05]

multiple?

[12:06]

>> I I have one cloud max. Um, there have

[12:08]

been a couple of times where I've hit my

[12:10]

hit my limit. Um, and I've had to wait

[12:11]

like a couple hours, but so far my usage

[12:14]

of Cloud Code has not has not

[12:18]

necessitated getting a second Cloud uh

[12:20]

Cloud Max subscription. But I do know

[12:22]

that there there are others who

[12:24]

>> Yeah, I was going to say when I talked

[12:25]

to Reszo, he mentioned he has like three

[12:26]

or four and he's like, you know, make

[12:28]

paying 400 bucks a month versus like

[12:30]

making a $800 bounty in a couple hours.

[12:32]

It's it works.

[12:33]

>> Yeah. Yeah. It's it's a great it's great

[12:35]

return on investment. It's just a matter

[12:37]

of how much

[12:39]

uh time I I want to spend. Like I'm not

[12:41]

having mine run every single like every

[12:43]

single minute of the day. And I think he

[12:45]

is. And I I could, but I've just not

[12:47]

pulled the trigger.

[12:48]

>> Has it been a time when you've launched

[12:49]

this and you're like, "Hey, go find

[12:50]

vulnerabilities overnight. You go to

[12:52]

sleep, you come back and you look at the

[12:53]

results, or are you just actually

[12:55]

actively doing it while you're online

[12:56]

yourself?"

[12:57]

>> Uh yeah. No. I'll when I'm in an LG, uh

[13:00]

I'll tell it to to look overnight. Or

[13:02]

I'll say, "I'm going to bed now. look

[13:05]

for keep looking for vulnerabilities on

[13:07]

this target. Uh do not stop until it is

[13:11]

like 8 am. Uh at which point I'll get

[13:14]

back to my computer. Uh if you are about

[13:15]

to give me a summary, pause, check the

[13:18]

time, and if it is not 8 a.m., do not

[13:20]

stop. And that usually does a pretty

[13:22]

good job of getting it to to continue.

[13:24]

Occasionally, it will it will like

[13:26]

think, "Oh, there's only two hours to

[13:28]

go. We're getting close." And then it'll

[13:30]

like work for like 10 more minutes and

[13:32]

be like, I guess I'm close enough. But

[13:34]

most of the time it'll get it to to

[13:36]

continuously work through the night.

[13:37]

>> Dude, that's baller. That's insanely

[13:39]

cool. I want to see what this finds. I'm

[13:41]

excited to see what this finds.

[13:42]

>> It looks like it's finding a bunch of

[13:44]

different acquisitions like Smart Apply,

[13:45]

Centa, Gus, Spark AI, Tenna, Joyide,

[13:49]

Light. Um I think Gus and Tenna are

[13:54]

newer acquisitions like maybe in the

[13:56]

last six months.

[13:57]

>> And it's cool. It's also taken like John

[13:58]

Deere cloud and I know that's a big

[14:01]

target on their end.

[14:03]

>> Yeah, exactly.

[14:04]

>> To go after

[14:04]

>> and it's finding things that maybe like

[14:06]

you wouldn't know were related like blue

[14:08]

river technology or bare flag. I feel

[14:10]

like uh cloud could also made

[14:12]

reconnaissance a little bit I don't want

[14:14]

to say obsolete but probably easier for

[14:16]

anyone that doesn't want to spend the

[14:17]

time to do recon and find these cuz back

[14:19]

in our days uh back in my day dude we'd

[14:22]

have to do like a who is and like verify

[14:24]

the domain when it was registered when

[14:26]

it was transferred do some digging into

[14:28]

like whether or not this company was you

[14:30]

know acquired but now you just pretty

[14:32]

much told cloud hey find acquisitions

[14:35]

and you said niche ones and it's finding

[14:37]

some really crazy interesting ones

[14:39]

Right.

[14:40]

>> Yeah, exactly. Exactly. Um, and so I'm

[14:43]

not sure how deep it's going to go. Like

[14:44]

it might it'll hopefully stop here soon

[14:46]

so we can kind of like actually pick one

[14:48]

or it might uh might work for the next

[14:50]

20 minutes.

[14:52]

So it looks like bare flag uh robotics

[14:58]

is an acquisition. Where would you

[15:02]

recommend starting

[15:05]

uh if we wanted to

[15:09]

um look for low hanging fruit?

[15:12]

>> And is this the flow that you usually do

[15:14]

for any of your new targets or is this

[15:16]

custom for any target that

[15:19]

uh you find? Like do you do something

[15:20]

custom for each one? you know, uh, this,

[15:24]

so when I approach a target, I usually

[15:26]

have a like particular asset that I want

[15:28]

to hack. And so I'll like I I probably

[15:31]

wouldn't have come in and be like, "Tell

[15:32]

me all the acquisitions and then pick

[15:34]

one for me." I would have been like,

[15:35]

"No, I know I'm going to to hack on on

[15:39]

Harvest Profit." Um but we can like I

[15:42]

don't know let's maybe we should just

[15:44]

start with harvest profit because I know

[15:45]

that's a that's a post off um

[15:48]

application and it has a

[15:50]

>> but my question is for right now it says

[15:52]

you know it's going to concretely do

[15:55]

subdomain dump probe each domain and

[15:57]

then mine do the main size js bundle are

[16:00]

these based on your your agent file that

[16:03]

you have

[16:04]

>> or is that based on cloud doing that

[16:05]

itself?

[16:06]

>> No no that that's based on my agent

[16:07]

file. Um, I've noticed in the past in a

[16:10]

lot of my vulnerabilities are because uh

[16:13]

hidden endpoints and hidden um scope is

[16:16]

often located in the JS bundles and so I

[16:19]

like tell it the importance of mining

[16:21]

mining mining mining and probing just to

[16:23]

get a full uh a full picture of the

[16:25]

application before going deep. Um

[16:28]

because otherwise and this was a problem

[16:30]

I struggled with beforehand like I would

[16:32]

give it say like uh you know John

[16:34]

Deere.com and then it would ask for off

[16:37]

and it would hit the main application

[16:39]

and not really venture outside of that

[16:41]

just that like those couple root paths.

[16:44]

Whereas um by telling it to mine and

[16:47]

look for hidden endpoints and look for

[16:48]

hidden scope and other other assets

[16:50]

within the JavaScript, it it knows to go

[16:53]

wide and look for really niche stuff,

[16:54]

which is which is how I've I've had a

[16:57]

lot of success in uh in Bug Bounty is

[16:59]

just by finding weird esoteric um

[17:02]

applications and and endpoints. Yeah, I

[17:04]

mean it just takes like a slash API v2

[17:07]

users to just get, you know, this user

[17:08]

data or some obscure way of like

[17:11]

registering a new user that's in the

[17:12]

JavaScript file for gain access to some

[17:15]

website that doesn't have the

[17:16]

registration in the UI, right? And next

[17:18]

thing you know, you're hitting some like

[17:20]

gold mine of, you know, 40 vans because

[17:23]

nobody else thought about looking at the

[17:24]

JavaScript file or people just don't

[17:26]

want to spend the time to do it because

[17:27]

it takes a lot of time to do it, too.

[17:28]

>> Well, yeah. Before like before AI, you

[17:30]

had to like like control F through

[17:32]

JavaScript. It's like, who wants to do

[17:34]

that?

[17:34]

>> Oh, yeah. You would have to get the JS

[17:36]

map maybe or, you know, reverse the JS

[17:37]

map if you're lucky enough to get it,

[17:39]

too.

[17:39]

>> Yeah. It was just, yeah, pain in the

[17:40]

ass. No wanted their eyes to bleed. But

[17:42]

now I can say like, hey, let's let's

[17:44]

mine, you know, let's mine the main

[17:46]

sites JavaScript bundle. Um, so here,

[17:48]

let's actually see what it does. Like,

[17:50]

sure, main or mine the uh main sites JS

[17:54]

bundle for API endpoints

[17:58]

and uh let me know what you find. How

[18:02]

much cloud did you use to create your

[18:05]

cloudmd?

[18:06]

>> Uh it was you know it was entirely cloud

[18:09]

like I would say so when I was when I

[18:11]

was building it I would say I'm getting

[18:14]

claude is have spending too much time

[18:16]

looking for uh for idors. So this is

[18:18]

actually a problem I started with

[18:19]

because like a lot of my reports in

[18:21]

hacker one are idors and like arvback

[18:23]

vulnerabilities

[18:24]

>> which are easy to find but not very

[18:25]

interesting. And so when I first gave it

[18:28]

all of my reports, uh, Claude was like

[18:30]

spending all of its time just like

[18:32]

looking for integer idors. And I'm like,

[18:36]

I I know how to find those. Those are

[18:37]

easy. This is not what I want to use my

[18:39]

tokens on. Uh, so I asked Claude, I'm

[18:41]

like, can you please make a change to

[18:43]

this template agent file, which says

[18:45]

that idors are important, but please

[18:48]

don't focus on those. And so it was able

[18:51]

to it was able to do that. um when I'd

[18:54]

find a new type of vulnerability, I

[18:56]

would have Claude uh add in add in a

[18:59]

note about that. Um so for example uh a

[19:03]

while back um found a uh a vulnerability

[19:08]

which in which a uh an internal octa

[19:12]

unintentionally had public or self-

[19:14]

signup uh available and so I could sign

[19:17]

up for I could register for

[19:20]

within an internal octa. Um, and so I

[19:23]

told I told uh

[19:26]

Cloud Code about this like, hey, my my

[19:29]

agent missed this missed this

[19:30]

vulnerability.

[19:32]

Modify my agent or my agent file to be

[19:35]

able to know that this is a possibility

[19:37]

and to keep an eye out for it. And so it

[19:38]

did.

[19:39]

>> So now every time you have a new target

[19:40]

that has a cell sign off available, it

[19:42]

means C for you.

[19:43]

>> Yeah, exactly.

[19:44]

>> All right, let's see what it found. It

[19:45]

says findings from the apex.

[19:49]

No bundles, no API calls. This might be

[19:51]

because like if I remember correctly um

[19:53]

like bare flag might just be like a

[19:55]

static a static web page. I don't think

[19:57]

it's an actual application. Um but if we

[20:00]

want like I know that harvest profit is

[20:02]

a like is an application that we can we

[20:05]

can hunt off.

[20:06]

>> Let's try it.

[20:07]

>> So yeah, let me go get some

[20:09]

>> let me get some off.

[20:12]

Uh I'm just going to go to

[20:13]

harvestproit.com.

[20:15]

Uh let's see. Try it for free. Start

[20:17]

14-day trial. So I'm just going to tell

[20:19]

cloud code I'm going to say okay we are

[20:22]

switching gears

[20:24]

uh to harvest profit because it has

[20:30]

authentication and is an actual web app.

[20:34]

I'll give you my session

[20:37]

which is here. So then let me just grab

[20:40]

my session ID

[20:42]

from my cookies in my browser. I'm a

[20:44]

sucker for code blocks even though cloud

[20:46]

doesn't need them.

[20:47]

Just muscle memory, right?

[20:49]

>> Oh, it mean it's going after the JWT

[20:51]

token to see if it can do some stuff to

[20:52]

it. HST56 not worth a weak secret. Uh

[20:56]

conclusion test later says hard harvest

[20:59]

profit isn't listed in. Let me just

[21:01]

double check.

[21:05]

They are a acquisition but maybe they're

[21:08]

not listed on John's VDP. No, it's

[21:10]

definitely in scope. Just not Yeah, it's

[21:11]

definitely in scope. Harvest profit is

[21:14]

definitely in scope. I just checked

[21:17]

here.

[21:17]

>> Okay. So, I'm assuming now it's just

[21:19]

going to make a request in the JS file,

[21:21]

dump it,

[21:22]

>> and see what's on there since you uh

[21:23]

authorized it, right?

[21:24]

>> And it should start uh

[21:27]

it should start fuzzing and looking for

[21:30]

additional JavaScript. Let's see.

[21:34]

Need a deeper probe. Let me uh check

[21:37]

this properly and grab the main

[21:39]

JavaScript bundle and check docs. Okay,

[21:41]

so it's knows it needs to look for the

[21:42]

docs for more information. So I put a

[21:44]

cost reference whatever's on the docs

[21:46]

API and then whatever's in the JS files

[21:48]

and kind of get an understanding of how

[21:50]

everything works. So when you're testing

[21:51]

like idors and things like that, let's

[21:52]

say if uh you have to do UI ids, are you

[21:54]

providing a different UIDS or you just

[21:56]

saying go figure it out on your own?

[21:59]

Yeah, I just have it figured out on its

[22:01]

own.

[22:01]

>> Well, what happens like let's say if

[22:03]

it's like a I'll use a I don't know,

[22:05]

let's say bank, right? You have UU ID

[22:07]

but you can't interact with other users.

[22:08]

Then what do you do then? Do you provide

[22:10]

it other accounts that you have for

[22:11]

testing purposes or?

[22:12]

>> Yeah, that's kind of what what you have

[22:14]

to do unless you want to run the risk of

[22:16]

accidentally doing damage to

[22:18]

>> some

[22:20]

you don't want that.

[22:21]

>> We don't want that. Nope. No, thank you.

[22:23]

>> And I've had situations like that where

[22:25]

Claude has been like pretty certain that

[22:27]

it could that a vulnerability exists,

[22:29]

but I don't have another uh I don't have

[22:32]

another session or another user uh

[22:34]

particularly on like applications that

[22:36]

require the program to give you elevated

[22:38]

access. And so in those cases, you can

[22:41]

just report it and say like based on the

[22:44]

evidence, I'm pretty sure this is a

[22:45]

vulnerability. Feel free to close as

[22:46]

informative if it's not actually

[22:48]

vulnerable. But I I think I think one's

[22:49]

here.

[22:50]

>> I was testing something on a pentest

[22:52]

this week and I had to tell it like do

[22:54]

not modify data if you modify revert

[22:56]

back.

[22:57]

>> Yep.

[22:58]

>> So if it's like changing my phone number

[23:00]

or my my 2FA, you're not changing it and

[23:03]

then like I can't get back into my

[23:04]

account or changing my password and I

[23:05]

can't get back in the account. I had

[23:07]

this this problem happened to me uh last

[23:10]

week where so I had a vulnerability and

[23:14]

well it was kind of a chain. There was

[23:16]

one that was a vulnerability but not

[23:17]

without any security impact where I

[23:19]

could bypass a like registration like

[23:21]

registration was normally like disabled

[23:24]

and I was able to to bypass

[23:25]

authorization just to get like an

[23:27]

account and I was able to get two

[23:28]

accounts. Now I found a pretty impactful

[23:32]

IOR. It was like a high um where one

[23:36]

account could delete another account and

[23:40]

Claude overnight found that

[23:43]

vulnerability, deleted my second

[23:45]

account, but by the time that I like was

[23:47]

able to like check it in the morning,

[23:48]

the team had noticed like my activity

[23:50]

and fixed the way to bypass

[23:53]

registration. And so I'm like, uh, I

[23:56]

can't like I can't reproduce it anymore

[23:58]

because I don't have a second account

[23:59]

because they fixed the they fixed the

[24:02]

the registration bypass. And so I I

[24:06]

ended up having to just give them access

[24:07]

to my to my one account and being like,

[24:09]

this here's what I've got. And they they

[24:11]

were able to they were able to confirm

[24:12]

the vulnerability existed and um and

[24:15]

actually and award it. But it was so

[24:18]

stressful when when Triage came back and

[24:21]

they're like, "We can't create an we

[24:23]

can't create a uh a second you we can't

[24:25]

create an account to test this. Are you

[24:26]

sure it's still vulnerable?" And I'm

[24:27]

like, "Oh god, I just spent like three

[24:30]

days on this vulnerability." Um, you

[24:32]

know, or I guess three days having

[24:33]

Claude like look for vulnerabilities and

[24:35]

finally found this one. And now Triage

[24:38]

can't reproduce it and neither can I

[24:39]

because they fixed part of it. So

[24:41]

fortunately, I still got my bouncy, but

[24:43]

it was it was a stressful Friday. I

[24:45]

played that for free. Dude, as you were

[24:46]

telling me about your account getting

[24:48]

deleted, I was like, "Oh, please tell me

[24:49]

cloud didn't go through and delete

[24:50]

everybody's accounts."

[24:51]

>> No. Goodness, no.

[24:53]

>> Could you imagine?

[24:54]

>> Yeah. Like I some I sometimes wonder how

[24:57]

like how responsible programs will hold

[24:59]

you. Like if if I specifically tell

[25:01]

Claude like do not delete data. I

[25:03]

repeat, do not delete data. And then

[25:05]

Claw deletes data. It's like what what

[25:07]

do I tell a program?

[25:09]

>> I don't know.

[25:11]

>> Whoops.

[25:14]

>> Okay, let's see. Uh, honest status. So,

[25:18]

club whenever has a bad news to tell

[25:19]

you, it'll use the word honest. It's

[25:21]

never

[25:22]

>> using a gold mine. You found the gold

[25:24]

mine. You hit the jackpot. It's honest.

[25:28]

>> Finding the API. Okay. Maybe it does

[25:30]

have maybe my session did not have

[25:32]

access to the API. So, what I'm going to

[25:33]

do is I'm going to make a request on the

[25:35]

uh on harvest profit and I'm going to

[25:37]

just give it my request. So, let's see.

[25:41]

Where is harvestp profofit again?

[25:42]

artistprofit.com.

[25:44]

Okay, so I'm going to

[25:50]

just hang tight while I grab I don't

[25:53]

even have Kaido open right now, so I'm

[25:54]

just going to have to grab it from the

[25:55]

network tab.

[25:56]

>> Speaking of Kaido, do you use the Kaido

[25:57]

scale at all for any of these?

[25:59]

>> No. No, but I know I need to. I know I

[26:01]

need to. I I have to definitely

[26:03]

recommend it, but I haven't set it up

[26:05]

myself. Yeah, I mean it would be

[26:06]

interesting to find like uh different

[26:08]

syncs that you're looking for and like

[26:10]

going through all your old data to find

[26:11]

like excess that you may have missed

[26:13]

from all these skills that you have. I

[26:15]

think it' be a really interesting one to

[26:16]

test out.

[26:17]

>> Okay, so after turning on Kaido and

[26:19]

capturing a request,

[26:21]

I'm actually just going to give uh

[26:25]

Claude my full like my entire request so

[26:27]

it has the cookies. Okay.

[26:30]

Um, I'll say here is a request to the

[26:34]

API. Please use this authentication to

[26:40]

look for further vulnerabilities.

[26:45]

So, I just gave basically my entire

[26:46]

request from um

[26:48]

>> an example query that you're making with

[26:49]

GraphQL.

[26:50]

>> Yeah. So, yeah. So, it has my cookies,

[26:52]

has the endpoint, and so now it should

[26:54]

be able to actually look for stuff. And

[26:57]

I've had to do that a number of times.

[26:58]

Just give it a give it a single request

[27:01]

so it knows what to do.

[27:02]

>> Yeah. I mean, I don't know about you

[27:03]

dude, but I freaking hate GraphQL and I

[27:05]

feel like this is a easy way to go. Not

[27:08]

my problem anymore. You figured out how

[27:09]

cloud go.

[27:10]

>> Exactly. Exactly. So, here here's Claude

[27:12]

being like hyperbolic again. Massive in

[27:19]

>> you know that it's like really serious

[27:20]

when it starts cussing. like uh at some

[27:23]

point it was like I found a I found a

[27:25]

crit on um on Monday and it was like

[27:29]

holy like okay

[27:31]

>> I saw you post that. Yeah.

[27:32]

>> Yeah. Yeah.

[27:34]

It's so funny. I I don't know why it

[27:37]

just I can't take Claude seriously when

[27:38]

it uh when it says things like that.

[27:41]

>> My immediate reaction to the gold mine

[27:42]

thing. It's like massive gold mine. We

[27:44]

just hit Jack. But I'm like relax dude.

[27:46]

You haven't even done anything yet. But

[27:47]

like chill. Like I lose my when we

[27:50]

find a good bug, but like you're you I

[27:52]

think we have a little bit more than

[27:53]

usual.

[27:54]

>> Highest EV I'm not sure what EV is. Uh

[27:57]

highest EV test right now. If exposed

[28:00]

without a authorization, every AG in the

[28:03]

system is readable by ID. So the

[28:05]

critical door,

[28:05]

>> but you just to be clear, you don't have

[28:07]

anything for GraphQL, right? You just

[28:08]

have vulnerability types. It's just

[28:09]

going to it's going based on the

[28:11]

documentation in the JavaScript file and

[28:12]

doing all this, right?

[28:13]

>> Yeah, exactly. I'm not sure what these

[28:15]

GIs are. So I can actually if you press

[28:17]

like uh command O or control O, what was

[28:20]

it? Is it control or command O? Yeah,

[28:23]

control O. It'll like you'll be able to

[28:24]

see the actual full request.

[28:26]

>> It becomes verbose.

[28:28]

>> Yeah. Well, not even verbose. Like you

[28:29]

see where it says like all this like

[28:31]

plus 19 lines, control O to expand.

[28:35]

>> You by default can only see like the

[28:36]

first like four lines. But if you're

[28:38]

like, well, I actually want to know what

[28:39]

those errors were. I want to know what

[28:41]

this data was.

[28:42]

>> Enumerating everything to user entity.

[28:46]

It's just coming up with tasks and doing

[28:48]

some findings at the same time.

[28:50]

>> Yeah. Yeah. Yeah. See the node ID

[28:52]

resolver uh for perm the error message

[28:56]

distinguishes between exists but hidden

[28:58]

and not found. Okay. So it's it's like

[29:00]

it okay so it's kind of found in Oracle

[29:04]

which isn't very exciting. Um

[29:06]

>> I mean it's enumeration. It's a good

[29:08]

finding for a pentest at least a not bug

[29:10]

bounty but like

[29:11]

>> or if you need to find a user ID for

[29:13]

something else you can chain with you

[29:14]

have this at least right

[29:15]

>> yeah exactly exactly so yeah it's not

[29:19]

not terribly exciting but I'll see so

[29:21]

it's like before I do anything I could

[29:23]

touch another user's data I want to

[29:24]

confirm the purchase the two viable

[29:25]

steps map the full schema by error

[29:28]

buzzing or aggressive uh test right side

[29:31]

authorization on the machine user or

[29:34]

machine upsert mutation with another

[29:36]

user's machine ID speed.

[29:38]

>> One question that I have is so what you

[29:40]

just showed me is practically what you

[29:41]

do with all these applications. What

[29:43]

about u like a blackbox approach? Let's

[29:46]

say you go to this domain and it

[29:48]

redirects you to an octa one login page

[29:50]

but you want to test it out. Do you tell

[29:52]

it like hey I want to just approach this

[29:56]

target or do you give more context? Like

[29:57]

how does that work?

[29:58]

>> Uh sometimes I'll I'll just say I want

[30:00]

to approach this target. Um, sometimes

[30:01]

I'll say what the what the goals are,

[30:03]

like um, I really want to find, um, you

[30:07]

know, an authentication bypass. Only

[30:09]

look for those. Um, occasionally I don't

[30:12]

really know what I'm looking for, but I

[30:13]

just know I want to bug. And this is

[30:15]

this is often what I'll do, like if I'm

[30:17]

going to bed at night and I'm kind of

[30:18]

tired and I just want to like shoot my

[30:20]

shot, I'll just say,

[30:22]

>> um, here's this target. Find a way to

[30:26]

find any vulnerabilities. Um, do not

[30:29]

stop. Um I'll come back in the morning

[30:32]

um and then it might come again I come

[30:34]

back in the morning and it might say you

[30:35]

know all paths are at dead ends and then

[30:37]

occasionally I just say assume there is

[30:39]

a vulnerability assume there is a

[30:41]

vulnerability here go and find it or

[30:43]

I'll tell it like I've already found a

[30:45]

vulnerability here it's your job to find

[30:47]

it even though I hadn't and just like

[30:49]

get it to try harder and harder and

[30:50]

harder and harder um and occasionally it

[30:52]

just kind of like breaks through

[30:53]

eventually

[30:53]

>> so you're tricking it by pushing it to

[30:55]

go harder and harder every time and help

[30:57]

you with finding something and you say

[30:58]

sometimes that works gaslighting LLM is

[31:01]

another level, my friend. We're

[31:02]

gaslighting modeled at this point in

[31:04]

2026. All right.

[31:06]

>> Yeah. I mean, until until uh some like

[31:08]

AI ethicists come out who are, you know,

[31:11]

championing for uh for AI rights, I

[31:14]

don't think that anyone's going to blame

[31:16]

me.

[31:16]

>> Somebody like me who has a history of

[31:18]

vulnerabilities on Hacker One, what's my

[31:20]

first, you know, five steps to do if I

[31:22]

want to start doing this? I have never

[31:23]

done.

[31:23]

>> Yeah. So if you if you've got

[31:25]

vulnerabilities on the Hacker One

[31:26]

platform, absolutely give it give it to

[31:28]

give it to Claude. Just uh tell give

[31:31]

Claude your like hacker one API key or

[31:32]

your bugout API key or whatever. Um say

[31:35]

fetch all of my reports um and create

[31:38]

skills to find vulnerabilities like the

[31:40]

ones I've already found. Um Claude will

[31:43]

do that. Um it can write its own skills.

[31:46]

Um and then uh tell Claude or write it

[31:48]

yourself, but tell Claude to uh create a

[31:51]

templated agent agent file. that you can

[31:53]

use on all targets that says explicitly

[31:56]

that you're a bug bounty hunter and you

[31:59]

only care about impactful bugs or bugs

[32:01]

that you can show immediate security

[32:03]

impact. You don't care about

[32:04]

misconfigurations. You don't care about

[32:06]

things that would just fill up a pentest

[32:08]

report. You don't care about things that

[32:10]

are theoretical or hypothetical. You

[32:12]

only care about things that you can

[32:14]

demonstrate real impact on real data.

[32:16]

Um, and then once like once you have

[32:18]

that agent file, your luck with cloud

[32:21]

code will go way way way further.

[32:23]

>> I think I'm gonna probably end mine with

[32:25]

a P p or GTFO at the end of my cloud

[32:28]

skill.

[32:28]

>> Yeah, exactly.

[32:29]

>> Just to make sure.

[32:31]

>> Okay. But what about somebody who's got

[32:33]

no historic, you know, let's say I'm a

[32:34]

new bug bounty hunter because you also

[32:36]

see the stories of like people that have

[32:38]

never done bug bounties are finding vans

[32:40]

using, you know, cloud code and things

[32:41]

like that. What's the recommendation

[32:42]

there? Do I just grab whatever PDF books

[32:44]

I have and throw them on there? Do I do

[32:46]

writeups for example? Like what's the

[32:48]

next go-to?

[32:49]

>> Well, uh fortunately uh most bug bounty

[32:52]

platforms have disclosed

[32:53]

vulnerabilities. And so like there is

[32:55]

effectively no difference between uh

[32:57]

vulnerabilities that you've written and

[32:59]

vulnerabilities that you can access

[33:01]

publicly because they've been disclosed.

[33:03]

And so I would like point Claude at all

[33:06]

disclosed Hacker One reports that have

[33:08]

been paid because there's a lot of

[33:09]

garbage that hasn't been paid. So, I

[33:11]

could tell uh I tell Claude to look for

[33:13]

all vulnerabilities that are publicly

[33:15]

disclosed, you know, that are severity

[33:17]

high or higher, greater um and have

[33:20]

received a bounty. And then, you know,

[33:21]

you've you've already populated your

[33:23]

populated your skills with pretty

[33:25]

valuable information

[33:26]

>> or also go to like the top 20 bug bounty

[33:28]

hunters that you know, go to their blog

[33:30]

posts.

[33:30]

>> Yeah, that too.

[33:31]

>> Anything you want to add? any any any

[33:33]

lessons you've learned from doing this

[33:34]

that you want to share with anybody

[33:35]

that's like yeah I wish I knew this when

[33:37]

I first started because I would have

[33:38]

saved a lot of more time than I do

[33:40]

today.

[33:40]

>> Yeah, it's that it's that like uh

[33:42]

writing a good Asian file takes a lot of

[33:44]

iterations. Like when I started my uh my

[33:47]

cloud code was just looking for idors

[33:49]

because that's all the that's all it

[33:50]

knew how to do because of the the bugs

[33:52]

that I reported or the bugs that I fed

[33:54]

it. And so I had to tell it okay this is

[33:56]

not like but I are valid but they're not

[33:59]

really what I want you to do. So, I've

[34:00]

gave it a like a ranking list like look

[34:02]

for server side vulnerabilities first.

[34:04]

Um, then kind of go down and look for

[34:07]

lesser severe vulnerabilities later on.

[34:09]

But like I really want to know about

[34:10]

SSRFs. I really want to know about PII

[34:12]

exposure. I really want to know about

[34:13]

blind access um rce etc. Um I I think I

[34:18]

said uh in my in my agent file like um

[34:22]

uh PII is the you know is the the golden

[34:24]

goose. Like most programs even most

[34:27]

programs that follow the the platform

[34:29]

standards will treat a mass PII leak as

[34:31]

crit full stop. And so like if I can if

[34:34]

I can find a way to leak other users

[34:36]

names or email addresses or phone

[34:38]

numbers like that's that's way it's way

[34:41]

easier than trying to find like an RC.

[34:43]

>> Yeah, absolutely. I mean it's it also

[34:44]

pays up there too, right? It's uh it's

[34:46]

still a

[34:48]

>> uh critical. Yeah.

[34:49]

>> Okay. Exactly. I'm going to I'm going to

[34:51]

do this. I think we move for the next

[34:52]

video. If you guys want to watch this,

[34:53]

drop a comment. Maybe we'll make a agent

[34:56]

file based on like public reports and

[34:57]

see where it goes.

[34:58]

>> Yeah, I think that'd be cool. Yeah, I'

[35:00]

I'd love to to see that or be a part of

[35:02]

it. And um uh because there's a lot of a

[35:05]

lot of good reports and I imagine that a

[35:07]

claude code who is fed only publicly

[35:09]

disclosed reports would actually perform

[35:11]

pretty well.

[35:11]

>> All right, that's it. If you watch it

[35:13]

all the way this far, thank you so much

[35:14]

for sticking around. But also, if you

[35:16]

want to watch me create a video around

[35:17]

maybe using Burp Suite Websick Academy

[35:20]

and creating our first skill, drop a

[35:21]

comment saying Claude and I'll make sure

[35:23]

to make one in one of the upcoming

[35:24]

weeks. All right, that's it. I'll see

[35:26]

you in next week's video. Peace.

Download Subtitles

These subtitles were extracted using the Free YouTube Subtitle Downloader by LunaNotes.

Download more subtitles

Related Videos

Download Subtitles for CLAUDE CODE Full Course 2026

Download Subtitles for CLAUDE CODE Full Course 2026

Enhance your learning experience with downloadable subtitles for the CLAUDE CODE FULL COURSE 4 HOURS: Build & Sell (2026). These captions help you follow along easily, improve comprehension, and revisit key concepts anytime. Perfect for learners who want clear, accessible content at their own pace.

Download Subtitles for MONEY EXPERTS: Earning $1 Million from $0

Download Subtitles for MONEY EXPERTS: Earning $1 Million from $0

Access accurate subtitles for the MONEY EXPERTS video where strategies to make $1 million from scratch are revealed. Downloading captions helps you follow expert insights easily and improves comprehension of key financial tips.

Download Subtitles for 3 SIMPLE Ways to Make $2000 with AI

Download Subtitles for 3 SIMPLE Ways to Make $2000 with AI

Easily download accurate subtitles for the video '3 SIMPLE Ways to Make $2000 with AI' and enhance your understanding of powerful AI money-making strategies. Improve accessibility, follow along effortlessly, and never miss a detail with our clear captions.

Download Subtitles for #1 Money Expert's 75/15/10 Wealth System

Download Subtitles for #1 Money Expert's 75/15/10 Wealth System

Access accurate subtitles for the #1 Money Expert's video on the 75/15/10 money system that helps build wealth regardless of your income. Downloading these captions ensures you grasp every detail of this powerful financial strategy to improve your money management skills.

Download Subtitles for Cheating Gold Digger | Financial Audit Video

Download Subtitles for Cheating Gold Digger | Financial Audit Video

Access accurate subtitles for the 'Cheating Gold Digger Is Destroying His Life' video to enhance your understanding and follow every detail of the financial audit story. Downloading subtitles ensures better comprehension and allows you to watch the video in various environments without missing key points.

Buy us a coffee

If you found these subtitles useful, consider buying us a coffee. It would help us a lot!

Let's Try!

Start Taking Better Notes Today with LunaNotes!