Download Subtitles for My Friend's $40,000 Claude Code Video
My Friend Made $40,000 Using Claude Code (Here's How)
NahamSec
SRT - Most compatible format for video players (VLC, media players, video editors)
VTT - Web Video Text Tracks for HTML5 video and browsers
TXT - Plain text with timestamps for easy reading and editing
Scroll to view all subtitles
This is Douglas and he has recently made
over $40,000 at a live hacking event
with Hacker 1 simply by using Cloud Code
and some of his custom skills that he
has created based on his reports on
Hacker 1. But before we get into this, I
want to quickly just announce what I'm
going to be doing moving forward with
these types of series. And honestly,
I've been seeing a lot of people create
their own Claude skills and using them
to make money, and I wanted to learn how
to do it. So, moving forward, I'm going
to try and make a couple of videos
around making your own skills or maybe
even bring in some other guests onto the
channel and having him share the screen
like today's episode and showing us how
to do it. But before we do this, do me a
favor, drop me a comment saying,
"Claude, if you want me to make a video
on creating our first Claude skill using
just public data that's out there on the
internet and then testing it out and
seeing if it finds vulnerabilities or
not. So, all you have to do is drop a
comment saying Claude and I will make
that for one of the upcoming videos. But
for now, let's jump into the video with
Archangel and see how he's using Claude
to find vulnerabilities on his bug
bounty targets. All right, man. Show me.
I know you've been building a lot of
cool stuff using AI and I know we you
and I were talking earlier and you
mentioned you use cloud or you know you
make your skills to hack on these
different programs. First of all, how
did you make these skills? Like give me
the structure behind the skills. How
does that look? What I did was at the
recommendation of some other hackers, I
took uh an export of all of my reports
on hacker one. Um, I think I just gave
Claude my hacker one API token and told
it to download all my reports. And then
I just gave it the instruction to build
uh skills um based on what it noticed in
my like 2000 something reports so that
anytime I spin up a cloud session, it
knows the types of vulnerabilities I'm
looking for, how to exploit them. And
then the the nifty part is that it can
grow, right? like as I report more and
more vulnerabilities, I can have it just
like refresh the skills based on these
new reports that have come in. Any
collabs that I do, like I have a couple
of collabs with um like with Alex
Chapman, uh with with you, with other
just high-profile hackers and so if I've
got those reports in my inbox, then uh
Claude is able to see them and I can
build skills based off of off of those
uh those reports as well.
>> Um
>> and then you use all these skills, the
same skills across all the programs, but
how do you customize this based on each
program? How does that work?
>> Yeah. So, so I've got a a blanket uh
like default agent file that I've I've
created that I'll uh I'll use whenever I
start any any program. Um however, as as
I get more involved in the program and
Claude learns about the the different
scope, um it can update its memory um to
so it's not going to update its
individual agent file, but it'll update
its memory file to know what is
important to this to this particular
program. So, for example, when hacking
on the uh Amazon VRP uh program,
uh like I really really like to find XSS
because they pay well. Um and so uh in
the in my Amazon directory, I'll have
the agent might have a a note in its
memory file saying really target um
cross-ite scripting vulnerabilities, one
because they're more common in this
program, but also because they pay well.
whereas another program might not pay uh
might not pay that much or might not be
interested in in XSS at all just because
it requires uh user interaction.
>> So you're heavily giving this a
framework per program like look for excs
for this one or this company may be
notorious for idors. So it also
prioritizes these vulnerabilities that
are worth it for these bug binding
programs versus the ones that may not
care for the same vulnerabilities. So
the structure is based on v type and
impact per program.
>> Yeah, exactly. Uh, but that that only
works if you have a good agent file to
begin with. Um, like if I were if I were
to just take out of the box cloud code,
then I'd have to wrestle with it every
single time that I start up a new
session telling it, okay, you're a bug
bounty hunter. We're going for impact
here, not just uh not just for
vulnerabilities if we're we in a pen
test. Because cloud code what it
sometimes does unless you tell it
specifically like you are a bug bounty
hunter is it'll like it'll focus on
things that don't have a lot of impact
or are just like defense and depth
misconfigurations or things that you
know like you and I know a program would
never pay for. Um so for example like
cores misconfigurations
um or theoretical vulnerabilities or
vulnerability which isn't exploitable
now but then may be exploitable in the
future like no program is going to pay
for those. Um, but cloud code, unless
you tell it otherwise, it like in your
initial agent file, it's going to focus
on those and, you know, give you that
big like jackpot or critical
vulnerability found, and you're going to
have to kind of steer it away from those
and coach it. Um, and so just to like
avoid that, um, you can create a a very
detailed um, and this we're spending the
tokens on, creating a very detailed
agent file so that you can just ignore
those from the offset. Um, and then so
what I do, I've got this I've got this
agent file which I u which I'll create
in every single directory um that I'm
that I'm hunting in. So um for example,
I'm not sure if my screen's being shared
now, but if I wanted to like hunt say uh
on John Deere's uh uh BDP, I could just
say I just say hunt John Deere
and then it creates a uh a t right
creates a John Deere directory in my
targets folder. Um, and if we ls, we've
got my claude agent file hidden here, or
which will tell Claude the the general
types of vulnerabilities that I like to
hunt for and uh the reason the reason
why we need to go for impact and not
just not just blanket vulnerabilities.
>> So, hunt is just an alias and that alias
does the copying your agent file,
creating the folders and the structure
around everything else.
>> Yeah, that's right. It's like it's just
like a four-line alias.
>> Where do you import your skills? How do
you import your skills? Where do those
come to play? So yeah, I put my skills
in the just like home directoryskills.
Yeah. So I've got like a a fuff skill
which I just uh copied from um Joseph
Thacker's uh GitHub. So shout out to
him. I got like a hunt at skill, hunt
blind xss, which has my uh which has my
blind xs payload. I've got a report
writing skill. Um and then yeah, just a
different type of skill for every single
type of vulnerability I might be looking
for. Um, and then so for example, if we
wanted to just like I'll just do like u
hunt a hunt rcce.
>> So I'm assuming with the skill and the
reports the reports are all the reports
that were RC related and then you
imported those into the markdown file
and then skill.md is how you verify and
look for these different RC's, right?
>> Yeah, that's exactly right. So I'll go
ahead and cat skill.md right now. Um,
and so if we look at it, we can see not
go up too far. There's a description of
the skill, but then you're you're
assisting Archangel hacker one. Use RC
report blah blah blah blah. Um, and then
RC, it tells it basically how important
it is. RC is the holy grail and bug
bounty. If you ever get this, look for
this. Then we've got a number of uh
different chains we can follow. Um,
things to look out for um CVES that
might be uh that might be useful, etc.
And then we just it goes down the entire
uh the entire skill um with the impact
um and then different things to
consider. So and the same thing can uh
we can look at the same thing for the
fuff one, right? So go cd fuff and this
is on uh just Joseph actor's github. So
this is you can go and look at the skill
yourself over uh over there. Let's go
ahead and ck skill.md.
>> So it's pretty much a how to use fuff
and knows exactly what to do. Yeah.
Yeah. Yeah. Exactly. Exactly. So it
gives it there's lots of examples
because I mean cloud code it's a you
know it's just
you're explaining to it using natural
language and so the more context you can
give it around not only what to do but
why to do it it's going to it's going to
perform better. So so any yeah those are
those are skills those are skills I've
given it. Um I can add more skills as I
as I find more types of vulnerabilities.
In fact I've got a couple on on my back
burner that I've been waiting to I've
been waiting to write. But if you want
to go back to my targets directory,
uh John Gear,
then yeah, so we've we've got uh we've
got my claude MD, which is my agent
file, which basically I I use to tell
Claude that uh you're not a pentester.
Uh you are a bug bounty hunter. And so
we always go for impact. Always impact.
Always impact. Always impact. And I
still even even with this agent file, I
sometimes have to remind Claude that
that we're going for impact. Um, and not
just going for for vulnerabilities that
that nobody cares about. Um, and it uh
it also prevents or having this agent
file also prevents uh me from having to
explain and justify my activity to
Claude because by default it'll be like
you can't uh you can't perform this uh
this activity because it's you know
against my ethical boundaries or
whatnot. But if it knows ahead of time
that you're a bug bounty enter and this
is an authorized engagement, you just
get to avoid having to to work around
that entirely.
>> This is great. It seems like it's like
automation built on crack at this point,
right? It's like it's even better than
automation because you're no longer just
automating your recon, but you can also
offload all your findings or at least
like the low hanging fruits that you
would look for easily and maybe even
miss sometimes, right? Because you're
not testing every parameter, every entry
point. You can have Cloud do it. How
much have you made using Cloud Skills in
the last, let's say, 90 days of doing
this?
>> 90 days is tough to say, but I can tell
you that at the last live hacking event,
um, I used Cloud Code entirely. I
basically just used Cloud Code, um, and
made between 40 and 50,000.
>> Holy dude. Congrats. That's
awesome.
>> Yeah. Yeah. And and not only does it
help you find those low hanging fruits,
but it it helps you test things that are
normally a pain to to test manually. So
for example, one of my vulnerabilities
that I I found during the the last lab
packet event I had to do some like web
hook manipulation and like nobody wants
to set like write a Python script to
make a web hook connection and then mod
make modifications dur while the
connection's open but cloud code can
just do it you know within like a couple
seconds and so just being able to to
quickly tell cloud code you know we've
got this web hook connection here's a
bug I want to try using that web hook
connection do it it just like saves so
much time so much time and I I was able
to find bugs that nobody else like even
looked for because I was doing things
that no manual hunter would want to do.
>> Yeah. I mean, it's it's a lot of grunt
work, right? It's a lot of setting up,
modifying, understanding things, and
then going back and forth, and they
could just do that in parallel a lot
easier. But can we see this in action?
Can you maybe do a little bit of uh
using your skills to do some stuff? We
can use John Deere as a program like you
have it right now.
>> Sure. So, let's go ahead and say uh so
we're in our John Deere directory. We
don't have any uh any customizations.
This is just cloud code out of the box
with my agent file. So I'll say like
claude and then I'll do the dangerously
skip permissions for the purpose of this
demonstration. Don't recommend it. Um
but uh I don't want to be flicking
through a bunch of like yes no prompts
uh while on stream. Um
and yes, I trust this holder. Okay, so
we're in cloud right now. We're in for
Yeah, we're in cloud code. We can say um
our target is currently John Deere via
um John Deere's
public uh BDP located on hacker 1. Um
now in this if we had a particular uh
application that we were looking to test
um we might do that. But let's say we're
let's say we're not actually sure what
we want to test. I'm not sure what part
of the scope I want to test, but I know
John Deere really cares about
acquisitions.
Um, can you find any niche acquisition
domains that uh we may start looking on?
And then it's going to run for uh for a
minute.
>> How many tokens are you burning through?
Is it just one cloud max or do you have
multiple?
>> I I have one cloud max. Um, there have
been a couple of times where I've hit my
hit my limit. Um, and I've had to wait
like a couple hours, but so far my usage
of Cloud Code has not has not
necessitated getting a second Cloud uh
Cloud Max subscription. But I do know
that there there are others who
>> Yeah, I was going to say when I talked
to Reszo, he mentioned he has like three
or four and he's like, you know, make
paying 400 bucks a month versus like
making a $800 bounty in a couple hours.
It's it works.
>> Yeah. Yeah. It's it's a great it's great
return on investment. It's just a matter
of how much
uh time I I want to spend. Like I'm not
having mine run every single like every
single minute of the day. And I think he
is. And I I could, but I've just not
pulled the trigger.
>> Has it been a time when you've launched
this and you're like, "Hey, go find
vulnerabilities overnight. You go to
sleep, you come back and you look at the
results, or are you just actually
actively doing it while you're online
yourself?"
>> Uh yeah. No. I'll when I'm in an LG, uh
I'll tell it to to look overnight. Or
I'll say, "I'm going to bed now. look
for keep looking for vulnerabilities on
this target. Uh do not stop until it is
like 8 am. Uh at which point I'll get
back to my computer. Uh if you are about
to give me a summary, pause, check the
time, and if it is not 8 a.m., do not
stop. And that usually does a pretty
good job of getting it to to continue.
Occasionally, it will it will like
think, "Oh, there's only two hours to
go. We're getting close." And then it'll
like work for like 10 more minutes and
be like, I guess I'm close enough. But
most of the time it'll get it to to
continuously work through the night.
>> Dude, that's baller. That's insanely
cool. I want to see what this finds. I'm
excited to see what this finds.
>> It looks like it's finding a bunch of
different acquisitions like Smart Apply,
Centa, Gus, Spark AI, Tenna, Joyide,
Light. Um I think Gus and Tenna are
newer acquisitions like maybe in the
last six months.
>> And it's cool. It's also taken like John
Deere cloud and I know that's a big
target on their end.
>> Yeah, exactly.
>> To go after
>> and it's finding things that maybe like
you wouldn't know were related like blue
river technology or bare flag. I feel
like uh cloud could also made
reconnaissance a little bit I don't want
to say obsolete but probably easier for
anyone that doesn't want to spend the
time to do recon and find these cuz back
in our days uh back in my day dude we'd
have to do like a who is and like verify
the domain when it was registered when
it was transferred do some digging into
like whether or not this company was you
know acquired but now you just pretty
much told cloud hey find acquisitions
and you said niche ones and it's finding
some really crazy interesting ones
Right.
>> Yeah, exactly. Exactly. Um, and so I'm
not sure how deep it's going to go. Like
it might it'll hopefully stop here soon
so we can kind of like actually pick one
or it might uh might work for the next
20 minutes.
So it looks like bare flag uh robotics
is an acquisition. Where would you
recommend starting
uh if we wanted to
um look for low hanging fruit?
>> And is this the flow that you usually do
for any of your new targets or is this
custom for any target that
uh you find? Like do you do something
custom for each one? you know, uh, this,
so when I approach a target, I usually
have a like particular asset that I want
to hack. And so I'll like I I probably
wouldn't have come in and be like, "Tell
me all the acquisitions and then pick
one for me." I would have been like,
"No, I know I'm going to to hack on on
Harvest Profit." Um but we can like I
don't know let's maybe we should just
start with harvest profit because I know
that's a that's a post off um
application and it has a
>> but my question is for right now it says
you know it's going to concretely do
subdomain dump probe each domain and
then mine do the main size js bundle are
these based on your your agent file that
you have
>> or is that based on cloud doing that
itself?
>> No no that that's based on my agent
file. Um, I've noticed in the past in a
lot of my vulnerabilities are because uh
hidden endpoints and hidden um scope is
often located in the JS bundles and so I
like tell it the importance of mining
mining mining mining and probing just to
get a full uh a full picture of the
application before going deep. Um
because otherwise and this was a problem
I struggled with beforehand like I would
give it say like uh you know John
Deere.com and then it would ask for off
and it would hit the main application
and not really venture outside of that
just that like those couple root paths.
Whereas um by telling it to mine and
look for hidden endpoints and look for
hidden scope and other other assets
within the JavaScript, it it knows to go
wide and look for really niche stuff,
which is which is how I've I've had a
lot of success in uh in Bug Bounty is
just by finding weird esoteric um
applications and and endpoints. Yeah, I
mean it just takes like a slash API v2
users to just get, you know, this user
data or some obscure way of like
registering a new user that's in the
JavaScript file for gain access to some
website that doesn't have the
registration in the UI, right? And next
thing you know, you're hitting some like
gold mine of, you know, 40 vans because
nobody else thought about looking at the
JavaScript file or people just don't
want to spend the time to do it because
it takes a lot of time to do it, too.
>> Well, yeah. Before like before AI, you
had to like like control F through
JavaScript. It's like, who wants to do
that?
>> Oh, yeah. You would have to get the JS
map maybe or, you know, reverse the JS
map if you're lucky enough to get it,
too.
>> Yeah. It was just, yeah, pain in the
ass. No wanted their eyes to bleed. But
now I can say like, hey, let's let's
mine, you know, let's mine the main
sites JavaScript bundle. Um, so here,
let's actually see what it does. Like,
sure, main or mine the uh main sites JS
bundle for API endpoints
and uh let me know what you find. How
much cloud did you use to create your
cloudmd?
>> Uh it was you know it was entirely cloud
like I would say so when I was when I
was building it I would say I'm getting
claude is have spending too much time
looking for uh for idors. So this is
actually a problem I started with
because like a lot of my reports in
hacker one are idors and like arvback
vulnerabilities
>> which are easy to find but not very
interesting. And so when I first gave it
all of my reports, uh, Claude was like
spending all of its time just like
looking for integer idors. And I'm like,
I I know how to find those. Those are
easy. This is not what I want to use my
tokens on. Uh, so I asked Claude, I'm
like, can you please make a change to
this template agent file, which says
that idors are important, but please
don't focus on those. And so it was able
to it was able to do that. um when I'd
find a new type of vulnerability, I
would have Claude uh add in add in a
note about that. Um so for example uh a
while back um found a uh a vulnerability
which in which a uh an internal octa
unintentionally had public or self-
signup uh available and so I could sign
up for I could register for
within an internal octa. Um, and so I
told I told uh
Cloud Code about this like, hey, my my
agent missed this missed this
vulnerability.
Modify my agent or my agent file to be
able to know that this is a possibility
and to keep an eye out for it. And so it
did.
>> So now every time you have a new target
that has a cell sign off available, it
means C for you.
>> Yeah, exactly.
>> All right, let's see what it found. It
says findings from the apex.
No bundles, no API calls. This might be
because like if I remember correctly um
like bare flag might just be like a
static a static web page. I don't think
it's an actual application. Um but if we
want like I know that harvest profit is
a like is an application that we can we
can hunt off.
>> Let's try it.
>> So yeah, let me go get some
>> let me get some off.
Uh I'm just going to go to
harvestproit.com.
Uh let's see. Try it for free. Start
14-day trial. So I'm just going to tell
cloud code I'm going to say okay we are
switching gears
uh to harvest profit because it has
authentication and is an actual web app.
I'll give you my session
which is here. So then let me just grab
my session ID
from my cookies in my browser. I'm a
sucker for code blocks even though cloud
doesn't need them.
Just muscle memory, right?
>> Oh, it mean it's going after the JWT
token to see if it can do some stuff to
it. HST56 not worth a weak secret. Uh
conclusion test later says hard harvest
profit isn't listed in. Let me just
double check.
They are a acquisition but maybe they're
not listed on John's VDP. No, it's
definitely in scope. Just not Yeah, it's
definitely in scope. Harvest profit is
definitely in scope. I just checked
here.
>> Okay. So, I'm assuming now it's just
going to make a request in the JS file,
dump it,
>> and see what's on there since you uh
authorized it, right?
>> And it should start uh
it should start fuzzing and looking for
additional JavaScript. Let's see.
Need a deeper probe. Let me uh check
this properly and grab the main
JavaScript bundle and check docs. Okay,
so it's knows it needs to look for the
docs for more information. So I put a
cost reference whatever's on the docs
API and then whatever's in the JS files
and kind of get an understanding of how
everything works. So when you're testing
like idors and things like that, let's
say if uh you have to do UI ids, are you
providing a different UIDS or you just
saying go figure it out on your own?
Yeah, I just have it figured out on its
own.
>> Well, what happens like let's say if
it's like a I'll use a I don't know,
let's say bank, right? You have UU ID
but you can't interact with other users.
Then what do you do then? Do you provide
it other accounts that you have for
testing purposes or?
>> Yeah, that's kind of what what you have
to do unless you want to run the risk of
accidentally doing damage to
>> some
you don't want that.
>> We don't want that. Nope. No, thank you.
>> And I've had situations like that where
Claude has been like pretty certain that
it could that a vulnerability exists,
but I don't have another uh I don't have
another session or another user uh
particularly on like applications that
require the program to give you elevated
access. And so in those cases, you can
just report it and say like based on the
evidence, I'm pretty sure this is a
vulnerability. Feel free to close as
informative if it's not actually
vulnerable. But I I think I think one's
here.
>> I was testing something on a pentest
this week and I had to tell it like do
not modify data if you modify revert
back.
>> Yep.
>> So if it's like changing my phone number
or my my 2FA, you're not changing it and
then like I can't get back into my
account or changing my password and I
can't get back in the account. I had
this this problem happened to me uh last
week where so I had a vulnerability and
well it was kind of a chain. There was
one that was a vulnerability but not
without any security impact where I
could bypass a like registration like
registration was normally like disabled
and I was able to to bypass
authorization just to get like an
account and I was able to get two
accounts. Now I found a pretty impactful
IOR. It was like a high um where one
account could delete another account and
Claude overnight found that
vulnerability, deleted my second
account, but by the time that I like was
able to like check it in the morning,
the team had noticed like my activity
and fixed the way to bypass
registration. And so I'm like, uh, I
can't like I can't reproduce it anymore
because I don't have a second account
because they fixed the they fixed the
the registration bypass. And so I I
ended up having to just give them access
to my to my one account and being like,
this here's what I've got. And they they
were able to they were able to confirm
the vulnerability existed and um and
actually and award it. But it was so
stressful when when Triage came back and
they're like, "We can't create an we
can't create a uh a second you we can't
create an account to test this. Are you
sure it's still vulnerable?" And I'm
like, "Oh god, I just spent like three
days on this vulnerability." Um, you
know, or I guess three days having
Claude like look for vulnerabilities and
finally found this one. And now Triage
can't reproduce it and neither can I
because they fixed part of it. So
fortunately, I still got my bouncy, but
it was it was a stressful Friday. I
played that for free. Dude, as you were
telling me about your account getting
deleted, I was like, "Oh, please tell me
cloud didn't go through and delete
everybody's accounts."
>> No. Goodness, no.
>> Could you imagine?
>> Yeah. Like I some I sometimes wonder how
like how responsible programs will hold
you. Like if if I specifically tell
Claude like do not delete data. I
repeat, do not delete data. And then
Claw deletes data. It's like what what
do I tell a program?
>> I don't know.
>> Whoops.
>> Okay, let's see. Uh, honest status. So,
club whenever has a bad news to tell
you, it'll use the word honest. It's
never
>> using a gold mine. You found the gold
mine. You hit the jackpot. It's honest.
>> Finding the API. Okay. Maybe it does
have maybe my session did not have
access to the API. So, what I'm going to
do is I'm going to make a request on the
uh on harvest profit and I'm going to
just give it my request. So, let's see.
Where is harvestp profofit again?
artistprofit.com.
Okay, so I'm going to
just hang tight while I grab I don't
even have Kaido open right now, so I'm
just going to have to grab it from the
network tab.
>> Speaking of Kaido, do you use the Kaido
scale at all for any of these?
>> No. No, but I know I need to. I know I
need to. I I have to definitely
recommend it, but I haven't set it up
myself. Yeah, I mean it would be
interesting to find like uh different
syncs that you're looking for and like
going through all your old data to find
like excess that you may have missed
from all these skills that you have. I
think it' be a really interesting one to
test out.
>> Okay, so after turning on Kaido and
capturing a request,
I'm actually just going to give uh
Claude my full like my entire request so
it has the cookies. Okay.
Um, I'll say here is a request to the
API. Please use this authentication to
look for further vulnerabilities.
So, I just gave basically my entire
request from um
>> an example query that you're making with
GraphQL.
>> Yeah. So, yeah. So, it has my cookies,
has the endpoint, and so now it should
be able to actually look for stuff. And
I've had to do that a number of times.
Just give it a give it a single request
so it knows what to do.
>> Yeah. I mean, I don't know about you
dude, but I freaking hate GraphQL and I
feel like this is a easy way to go. Not
my problem anymore. You figured out how
cloud go.
>> Exactly. Exactly. So, here here's Claude
being like hyperbolic again. Massive in
>> you know that it's like really serious
when it starts cussing. like uh at some
point it was like I found a I found a
crit on um on Monday and it was like
holy like okay
>> I saw you post that. Yeah.
>> Yeah. Yeah.
It's so funny. I I don't know why it
just I can't take Claude seriously when
it uh when it says things like that.
>> My immediate reaction to the gold mine
thing. It's like massive gold mine. We
just hit Jack. But I'm like relax dude.
You haven't even done anything yet. But
like chill. Like I lose my when we
find a good bug, but like you're you I
think we have a little bit more than
usual.
>> Highest EV I'm not sure what EV is. Uh
highest EV test right now. If exposed
without a authorization, every AG in the
system is readable by ID. So the
critical door,
>> but you just to be clear, you don't have
anything for GraphQL, right? You just
have vulnerability types. It's just
going to it's going based on the
documentation in the JavaScript file and
doing all this, right?
>> Yeah, exactly. I'm not sure what these
GIs are. So I can actually if you press
like uh command O or control O, what was
it? Is it control or command O? Yeah,
control O. It'll like you'll be able to
see the actual full request.
>> It becomes verbose.
>> Yeah. Well, not even verbose. Like you
see where it says like all this like
plus 19 lines, control O to expand.
>> You by default can only see like the
first like four lines. But if you're
like, well, I actually want to know what
those errors were. I want to know what
this data was.
>> Enumerating everything to user entity.
It's just coming up with tasks and doing
some findings at the same time.
>> Yeah. Yeah. Yeah. See the node ID
resolver uh for perm the error message
distinguishes between exists but hidden
and not found. Okay. So it's it's like
it okay so it's kind of found in Oracle
which isn't very exciting. Um
>> I mean it's enumeration. It's a good
finding for a pentest at least a not bug
bounty but like
>> or if you need to find a user ID for
something else you can chain with you
have this at least right
>> yeah exactly exactly so yeah it's not
not terribly exciting but I'll see so
it's like before I do anything I could
touch another user's data I want to
confirm the purchase the two viable
steps map the full schema by error
buzzing or aggressive uh test right side
authorization on the machine user or
machine upsert mutation with another
user's machine ID speed.
>> One question that I have is so what you
just showed me is practically what you
do with all these applications. What
about u like a blackbox approach? Let's
say you go to this domain and it
redirects you to an octa one login page
but you want to test it out. Do you tell
it like hey I want to just approach this
target or do you give more context? Like
how does that work?
>> Uh sometimes I'll I'll just say I want
to approach this target. Um, sometimes
I'll say what the what the goals are,
like um, I really want to find, um, you
know, an authentication bypass. Only
look for those. Um, occasionally I don't
really know what I'm looking for, but I
just know I want to bug. And this is
this is often what I'll do, like if I'm
going to bed at night and I'm kind of
tired and I just want to like shoot my
shot, I'll just say,
>> um, here's this target. Find a way to
find any vulnerabilities. Um, do not
stop. Um I'll come back in the morning
um and then it might come again I come
back in the morning and it might say you
know all paths are at dead ends and then
occasionally I just say assume there is
a vulnerability assume there is a
vulnerability here go and find it or
I'll tell it like I've already found a
vulnerability here it's your job to find
it even though I hadn't and just like
get it to try harder and harder and
harder and harder um and occasionally it
just kind of like breaks through
eventually
>> so you're tricking it by pushing it to
go harder and harder every time and help
you with finding something and you say
sometimes that works gaslighting LLM is
another level, my friend. We're
gaslighting modeled at this point in
2026. All right.
>> Yeah. I mean, until until uh some like
AI ethicists come out who are, you know,
championing for uh for AI rights, I
don't think that anyone's going to blame
me.
>> Somebody like me who has a history of
vulnerabilities on Hacker One, what's my
first, you know, five steps to do if I
want to start doing this? I have never
done.
>> Yeah. So if you if you've got
vulnerabilities on the Hacker One
platform, absolutely give it give it to
give it to Claude. Just uh tell give
Claude your like hacker one API key or
your bugout API key or whatever. Um say
fetch all of my reports um and create
skills to find vulnerabilities like the
ones I've already found. Um Claude will
do that. Um it can write its own skills.
Um and then uh tell Claude or write it
yourself, but tell Claude to uh create a
templated agent agent file. that you can
use on all targets that says explicitly
that you're a bug bounty hunter and you
only care about impactful bugs or bugs
that you can show immediate security
impact. You don't care about
misconfigurations. You don't care about
things that would just fill up a pentest
report. You don't care about things that
are theoretical or hypothetical. You
only care about things that you can
demonstrate real impact on real data.
Um, and then once like once you have
that agent file, your luck with cloud
code will go way way way further.
>> I think I'm gonna probably end mine with
a P p or GTFO at the end of my cloud
skill.
>> Yeah, exactly.
>> Just to make sure.
>> Okay. But what about somebody who's got
no historic, you know, let's say I'm a
new bug bounty hunter because you also
see the stories of like people that have
never done bug bounties are finding vans
using, you know, cloud code and things
like that. What's the recommendation
there? Do I just grab whatever PDF books
I have and throw them on there? Do I do
writeups for example? Like what's the
next go-to?
>> Well, uh fortunately uh most bug bounty
platforms have disclosed
vulnerabilities. And so like there is
effectively no difference between uh
vulnerabilities that you've written and
vulnerabilities that you can access
publicly because they've been disclosed.
And so I would like point Claude at all
disclosed Hacker One reports that have
been paid because there's a lot of
garbage that hasn't been paid. So, I
could tell uh I tell Claude to look for
all vulnerabilities that are publicly
disclosed, you know, that are severity
high or higher, greater um and have
received a bounty. And then, you know,
you've you've already populated your
populated your skills with pretty
valuable information
>> or also go to like the top 20 bug bounty
hunters that you know, go to their blog
posts.
>> Yeah, that too.
>> Anything you want to add? any any any
lessons you've learned from doing this
that you want to share with anybody
that's like yeah I wish I knew this when
I first started because I would have
saved a lot of more time than I do
today.
>> Yeah, it's that it's that like uh
writing a good Asian file takes a lot of
iterations. Like when I started my uh my
cloud code was just looking for idors
because that's all the that's all it
knew how to do because of the the bugs
that I reported or the bugs that I fed
it. And so I had to tell it okay this is
not like but I are valid but they're not
really what I want you to do. So, I've
gave it a like a ranking list like look
for server side vulnerabilities first.
Um, then kind of go down and look for
lesser severe vulnerabilities later on.
But like I really want to know about
SSRFs. I really want to know about PII
exposure. I really want to know about
blind access um rce etc. Um I I think I
said uh in my in my agent file like um
uh PII is the you know is the the golden
goose. Like most programs even most
programs that follow the the platform
standards will treat a mass PII leak as
crit full stop. And so like if I can if
I can find a way to leak other users
names or email addresses or phone
numbers like that's that's way it's way
easier than trying to find like an RC.
>> Yeah, absolutely. I mean it's it also
pays up there too, right? It's uh it's
still a
>> uh critical. Yeah.
>> Okay. Exactly. I'm going to I'm going to
do this. I think we move for the next
video. If you guys want to watch this,
drop a comment. Maybe we'll make a agent
file based on like public reports and
see where it goes.
>> Yeah, I think that'd be cool. Yeah, I'
I'd love to to see that or be a part of
it. And um uh because there's a lot of a
lot of good reports and I imagine that a
claude code who is fed only publicly
disclosed reports would actually perform
pretty well.
>> All right, that's it. If you watch it
all the way this far, thank you so much
for sticking around. But also, if you
want to watch me create a video around
maybe using Burp Suite Websick Academy
and creating our first skill, drop a
comment saying Claude and I'll make sure
to make one in one of the upcoming
weeks. All right, that's it. I'll see
you in next week's video. Peace.
Full transcript without timestamps
This is Douglas and he has recently made over $40,000 at a live hacking event with Hacker 1 simply by using Cloud Code and some of his custom skills that he has created based on his reports on Hacker 1. But before we get into this, I want to quickly just announce what I'm going to be doing moving forward with these types of series. And honestly, I've been seeing a lot of people create their own Claude skills and using them to make money, and I wanted to learn how to do it. So, moving forward, I'm going to try and make a couple of videos around making your own skills or maybe even bring in some other guests onto the channel and having him share the screen like today's episode and showing us how to do it. But before we do this, do me a favor, drop me a comment saying, "Claude, if you want me to make a video on creating our first Claude skill using just public data that's out there on the internet and then testing it out and seeing if it finds vulnerabilities or not. So, all you have to do is drop a comment saying Claude and I will make that for one of the upcoming videos. But for now, let's jump into the video with Archangel and see how he's using Claude to find vulnerabilities on his bug bounty targets. All right, man. Show me. I know you've been building a lot of cool stuff using AI and I know we you and I were talking earlier and you mentioned you use cloud or you know you make your skills to hack on these different programs. First of all, how did you make these skills? Like give me the structure behind the skills. How does that look? What I did was at the recommendation of some other hackers, I took uh an export of all of my reports on hacker one. Um, I think I just gave Claude my hacker one API token and told it to download all my reports. And then I just gave it the instruction to build uh skills um based on what it noticed in my like 2000 something reports so that anytime I spin up a cloud session, it knows the types of vulnerabilities I'm looking for, how to exploit them. And then the the nifty part is that it can grow, right? like as I report more and more vulnerabilities, I can have it just like refresh the skills based on these new reports that have come in. Any collabs that I do, like I have a couple of collabs with um like with Alex Chapman, uh with with you, with other just high-profile hackers and so if I've got those reports in my inbox, then uh Claude is able to see them and I can build skills based off of off of those uh those reports as well. >> Um >> and then you use all these skills, the same skills across all the programs, but how do you customize this based on each program? How does that work? >> Yeah. So, so I've got a a blanket uh like default agent file that I've I've created that I'll uh I'll use whenever I start any any program. Um however, as as I get more involved in the program and Claude learns about the the different scope, um it can update its memory um to so it's not going to update its individual agent file, but it'll update its memory file to know what is important to this to this particular program. So, for example, when hacking on the uh Amazon VRP uh program, uh like I really really like to find XSS because they pay well. Um and so uh in the in my Amazon directory, I'll have the agent might have a a note in its memory file saying really target um cross-ite scripting vulnerabilities, one because they're more common in this program, but also because they pay well. whereas another program might not pay uh might not pay that much or might not be interested in in XSS at all just because it requires uh user interaction. >> So you're heavily giving this a framework per program like look for excs for this one or this company may be notorious for idors. So it also prioritizes these vulnerabilities that are worth it for these bug binding programs versus the ones that may not care for the same vulnerabilities. So the structure is based on v type and impact per program. >> Yeah, exactly. Uh, but that that only works if you have a good agent file to begin with. Um, like if I were if I were to just take out of the box cloud code, then I'd have to wrestle with it every single time that I start up a new session telling it, okay, you're a bug bounty hunter. We're going for impact here, not just uh not just for vulnerabilities if we're we in a pen test. Because cloud code what it sometimes does unless you tell it specifically like you are a bug bounty hunter is it'll like it'll focus on things that don't have a lot of impact or are just like defense and depth misconfigurations or things that you know like you and I know a program would never pay for. Um so for example like cores misconfigurations um or theoretical vulnerabilities or vulnerability which isn't exploitable now but then may be exploitable in the future like no program is going to pay for those. Um, but cloud code, unless you tell it otherwise, it like in your initial agent file, it's going to focus on those and, you know, give you that big like jackpot or critical vulnerability found, and you're going to have to kind of steer it away from those and coach it. Um, and so just to like avoid that, um, you can create a a very detailed um, and this we're spending the tokens on, creating a very detailed agent file so that you can just ignore those from the offset. Um, and then so what I do, I've got this I've got this agent file which I u which I'll create in every single directory um that I'm that I'm hunting in. So um for example, I'm not sure if my screen's being shared now, but if I wanted to like hunt say uh on John Deere's uh uh BDP, I could just say I just say hunt John Deere and then it creates a uh a t right creates a John Deere directory in my targets folder. Um, and if we ls, we've got my claude agent file hidden here, or which will tell Claude the the general types of vulnerabilities that I like to hunt for and uh the reason the reason why we need to go for impact and not just not just blanket vulnerabilities. >> So, hunt is just an alias and that alias does the copying your agent file, creating the folders and the structure around everything else. >> Yeah, that's right. It's like it's just like a four-line alias. >> Where do you import your skills? How do you import your skills? Where do those come to play? So yeah, I put my skills in the just like home directoryskills. Yeah. So I've got like a a fuff skill which I just uh copied from um Joseph Thacker's uh GitHub. So shout out to him. I got like a hunt at skill, hunt blind xss, which has my uh which has my blind xs payload. I've got a report writing skill. Um and then yeah, just a different type of skill for every single type of vulnerability I might be looking for. Um, and then so for example, if we wanted to just like I'll just do like u hunt a hunt rcce. >> So I'm assuming with the skill and the reports the reports are all the reports that were RC related and then you imported those into the markdown file and then skill.md is how you verify and look for these different RC's, right? >> Yeah, that's exactly right. So I'll go ahead and cat skill.md right now. Um, and so if we look at it, we can see not go up too far. There's a description of the skill, but then you're you're assisting Archangel hacker one. Use RC report blah blah blah blah. Um, and then RC, it tells it basically how important it is. RC is the holy grail and bug bounty. If you ever get this, look for this. Then we've got a number of uh different chains we can follow. Um, things to look out for um CVES that might be uh that might be useful, etc. And then we just it goes down the entire uh the entire skill um with the impact um and then different things to consider. So and the same thing can uh we can look at the same thing for the fuff one, right? So go cd fuff and this is on uh just Joseph actor's github. So this is you can go and look at the skill yourself over uh over there. Let's go ahead and ck skill.md. >> So it's pretty much a how to use fuff and knows exactly what to do. Yeah. Yeah. Yeah. Exactly. Exactly. So it gives it there's lots of examples because I mean cloud code it's a you know it's just you're explaining to it using natural language and so the more context you can give it around not only what to do but why to do it it's going to it's going to perform better. So so any yeah those are those are skills those are skills I've given it. Um I can add more skills as I as I find more types of vulnerabilities. In fact I've got a couple on on my back burner that I've been waiting to I've been waiting to write. But if you want to go back to my targets directory, uh John Gear, then yeah, so we've we've got uh we've got my claude MD, which is my agent file, which basically I I use to tell Claude that uh you're not a pentester. Uh you are a bug bounty hunter. And so we always go for impact. Always impact. Always impact. Always impact. And I still even even with this agent file, I sometimes have to remind Claude that that we're going for impact. Um, and not just going for for vulnerabilities that that nobody cares about. Um, and it uh it also prevents or having this agent file also prevents uh me from having to explain and justify my activity to Claude because by default it'll be like you can't uh you can't perform this uh this activity because it's you know against my ethical boundaries or whatnot. But if it knows ahead of time that you're a bug bounty enter and this is an authorized engagement, you just get to avoid having to to work around that entirely. >> This is great. It seems like it's like automation built on crack at this point, right? It's like it's even better than automation because you're no longer just automating your recon, but you can also offload all your findings or at least like the low hanging fruits that you would look for easily and maybe even miss sometimes, right? Because you're not testing every parameter, every entry point. You can have Cloud do it. How much have you made using Cloud Skills in the last, let's say, 90 days of doing this? >> 90 days is tough to say, but I can tell you that at the last live hacking event, um, I used Cloud Code entirely. I basically just used Cloud Code, um, and made between 40 and 50,000. >> Holy dude. Congrats. That's awesome. >> Yeah. Yeah. And and not only does it help you find those low hanging fruits, but it it helps you test things that are normally a pain to to test manually. So for example, one of my vulnerabilities that I I found during the the last lab packet event I had to do some like web hook manipulation and like nobody wants to set like write a Python script to make a web hook connection and then mod make modifications dur while the connection's open but cloud code can just do it you know within like a couple seconds and so just being able to to quickly tell cloud code you know we've got this web hook connection here's a bug I want to try using that web hook connection do it it just like saves so much time so much time and I I was able to find bugs that nobody else like even looked for because I was doing things that no manual hunter would want to do. >> Yeah. I mean, it's it's a lot of grunt work, right? It's a lot of setting up, modifying, understanding things, and then going back and forth, and they could just do that in parallel a lot easier. But can we see this in action? Can you maybe do a little bit of uh using your skills to do some stuff? We can use John Deere as a program like you have it right now. >> Sure. So, let's go ahead and say uh so we're in our John Deere directory. We don't have any uh any customizations. This is just cloud code out of the box with my agent file. So I'll say like claude and then I'll do the dangerously skip permissions for the purpose of this demonstration. Don't recommend it. Um but uh I don't want to be flicking through a bunch of like yes no prompts uh while on stream. Um and yes, I trust this holder. Okay, so we're in cloud right now. We're in for Yeah, we're in cloud code. We can say um our target is currently John Deere via um John Deere's public uh BDP located on hacker 1. Um now in this if we had a particular uh application that we were looking to test um we might do that. But let's say we're let's say we're not actually sure what we want to test. I'm not sure what part of the scope I want to test, but I know John Deere really cares about acquisitions. Um, can you find any niche acquisition domains that uh we may start looking on? And then it's going to run for uh for a minute. >> How many tokens are you burning through? Is it just one cloud max or do you have multiple? >> I I have one cloud max. Um, there have been a couple of times where I've hit my hit my limit. Um, and I've had to wait like a couple hours, but so far my usage of Cloud Code has not has not necessitated getting a second Cloud uh Cloud Max subscription. But I do know that there there are others who >> Yeah, I was going to say when I talked to Reszo, he mentioned he has like three or four and he's like, you know, make paying 400 bucks a month versus like making a $800 bounty in a couple hours. It's it works. >> Yeah. Yeah. It's it's a great it's great return on investment. It's just a matter of how much uh time I I want to spend. Like I'm not having mine run every single like every single minute of the day. And I think he is. And I I could, but I've just not pulled the trigger. >> Has it been a time when you've launched this and you're like, "Hey, go find vulnerabilities overnight. You go to sleep, you come back and you look at the results, or are you just actually actively doing it while you're online yourself?" >> Uh yeah. No. I'll when I'm in an LG, uh I'll tell it to to look overnight. Or I'll say, "I'm going to bed now. look for keep looking for vulnerabilities on this target. Uh do not stop until it is like 8 am. Uh at which point I'll get back to my computer. Uh if you are about to give me a summary, pause, check the time, and if it is not 8 a.m., do not stop. And that usually does a pretty good job of getting it to to continue. Occasionally, it will it will like think, "Oh, there's only two hours to go. We're getting close." And then it'll like work for like 10 more minutes and be like, I guess I'm close enough. But most of the time it'll get it to to continuously work through the night. >> Dude, that's baller. That's insanely cool. I want to see what this finds. I'm excited to see what this finds. >> It looks like it's finding a bunch of different acquisitions like Smart Apply, Centa, Gus, Spark AI, Tenna, Joyide, Light. Um I think Gus and Tenna are newer acquisitions like maybe in the last six months. >> And it's cool. It's also taken like John Deere cloud and I know that's a big target on their end. >> Yeah, exactly. >> To go after >> and it's finding things that maybe like you wouldn't know were related like blue river technology or bare flag. I feel like uh cloud could also made reconnaissance a little bit I don't want to say obsolete but probably easier for anyone that doesn't want to spend the time to do recon and find these cuz back in our days uh back in my day dude we'd have to do like a who is and like verify the domain when it was registered when it was transferred do some digging into like whether or not this company was you know acquired but now you just pretty much told cloud hey find acquisitions and you said niche ones and it's finding some really crazy interesting ones Right. >> Yeah, exactly. Exactly. Um, and so I'm not sure how deep it's going to go. Like it might it'll hopefully stop here soon so we can kind of like actually pick one or it might uh might work for the next 20 minutes. So it looks like bare flag uh robotics is an acquisition. Where would you recommend starting uh if we wanted to um look for low hanging fruit? >> And is this the flow that you usually do for any of your new targets or is this custom for any target that uh you find? Like do you do something custom for each one? you know, uh, this, so when I approach a target, I usually have a like particular asset that I want to hack. And so I'll like I I probably wouldn't have come in and be like, "Tell me all the acquisitions and then pick one for me." I would have been like, "No, I know I'm going to to hack on on Harvest Profit." Um but we can like I don't know let's maybe we should just start with harvest profit because I know that's a that's a post off um application and it has a >> but my question is for right now it says you know it's going to concretely do subdomain dump probe each domain and then mine do the main size js bundle are these based on your your agent file that you have >> or is that based on cloud doing that itself? >> No no that that's based on my agent file. Um, I've noticed in the past in a lot of my vulnerabilities are because uh hidden endpoints and hidden um scope is often located in the JS bundles and so I like tell it the importance of mining mining mining mining and probing just to get a full uh a full picture of the application before going deep. Um because otherwise and this was a problem I struggled with beforehand like I would give it say like uh you know John Deere.com and then it would ask for off and it would hit the main application and not really venture outside of that just that like those couple root paths. Whereas um by telling it to mine and look for hidden endpoints and look for hidden scope and other other assets within the JavaScript, it it knows to go wide and look for really niche stuff, which is which is how I've I've had a lot of success in uh in Bug Bounty is just by finding weird esoteric um applications and and endpoints. Yeah, I mean it just takes like a slash API v2 users to just get, you know, this user data or some obscure way of like registering a new user that's in the JavaScript file for gain access to some website that doesn't have the registration in the UI, right? And next thing you know, you're hitting some like gold mine of, you know, 40 vans because nobody else thought about looking at the JavaScript file or people just don't want to spend the time to do it because it takes a lot of time to do it, too. >> Well, yeah. Before like before AI, you had to like like control F through JavaScript. It's like, who wants to do that? >> Oh, yeah. You would have to get the JS map maybe or, you know, reverse the JS map if you're lucky enough to get it, too. >> Yeah. It was just, yeah, pain in the ass. No wanted their eyes to bleed. But now I can say like, hey, let's let's mine, you know, let's mine the main sites JavaScript bundle. Um, so here, let's actually see what it does. Like, sure, main or mine the uh main sites JS bundle for API endpoints and uh let me know what you find. How much cloud did you use to create your cloudmd? >> Uh it was you know it was entirely cloud like I would say so when I was when I was building it I would say I'm getting claude is have spending too much time looking for uh for idors. So this is actually a problem I started with because like a lot of my reports in hacker one are idors and like arvback vulnerabilities >> which are easy to find but not very interesting. And so when I first gave it all of my reports, uh, Claude was like spending all of its time just like looking for integer idors. And I'm like, I I know how to find those. Those are easy. This is not what I want to use my tokens on. Uh, so I asked Claude, I'm like, can you please make a change to this template agent file, which says that idors are important, but please don't focus on those. And so it was able to it was able to do that. um when I'd find a new type of vulnerability, I would have Claude uh add in add in a note about that. Um so for example uh a while back um found a uh a vulnerability which in which a uh an internal octa unintentionally had public or self- signup uh available and so I could sign up for I could register for within an internal octa. Um, and so I told I told uh Cloud Code about this like, hey, my my agent missed this missed this vulnerability. Modify my agent or my agent file to be able to know that this is a possibility and to keep an eye out for it. And so it did. >> So now every time you have a new target that has a cell sign off available, it means C for you. >> Yeah, exactly. >> All right, let's see what it found. It says findings from the apex. No bundles, no API calls. This might be because like if I remember correctly um like bare flag might just be like a static a static web page. I don't think it's an actual application. Um but if we want like I know that harvest profit is a like is an application that we can we can hunt off. >> Let's try it. >> So yeah, let me go get some >> let me get some off. Uh I'm just going to go to harvestproit.com. Uh let's see. Try it for free. Start 14-day trial. So I'm just going to tell cloud code I'm going to say okay we are switching gears uh to harvest profit because it has authentication and is an actual web app. I'll give you my session which is here. So then let me just grab my session ID from my cookies in my browser. I'm a sucker for code blocks even though cloud doesn't need them. Just muscle memory, right? >> Oh, it mean it's going after the JWT token to see if it can do some stuff to it. HST56 not worth a weak secret. Uh conclusion test later says hard harvest profit isn't listed in. Let me just double check. They are a acquisition but maybe they're not listed on John's VDP. No, it's definitely in scope. Just not Yeah, it's definitely in scope. Harvest profit is definitely in scope. I just checked here. >> Okay. So, I'm assuming now it's just going to make a request in the JS file, dump it, >> and see what's on there since you uh authorized it, right? >> And it should start uh it should start fuzzing and looking for additional JavaScript. Let's see. Need a deeper probe. Let me uh check this properly and grab the main JavaScript bundle and check docs. Okay, so it's knows it needs to look for the docs for more information. So I put a cost reference whatever's on the docs API and then whatever's in the JS files and kind of get an understanding of how everything works. So when you're testing like idors and things like that, let's say if uh you have to do UI ids, are you providing a different UIDS or you just saying go figure it out on your own? Yeah, I just have it figured out on its own. >> Well, what happens like let's say if it's like a I'll use a I don't know, let's say bank, right? You have UU ID but you can't interact with other users. Then what do you do then? Do you provide it other accounts that you have for testing purposes or? >> Yeah, that's kind of what what you have to do unless you want to run the risk of accidentally doing damage to >> some you don't want that. >> We don't want that. Nope. No, thank you. >> And I've had situations like that where Claude has been like pretty certain that it could that a vulnerability exists, but I don't have another uh I don't have another session or another user uh particularly on like applications that require the program to give you elevated access. And so in those cases, you can just report it and say like based on the evidence, I'm pretty sure this is a vulnerability. Feel free to close as informative if it's not actually vulnerable. But I I think I think one's here. >> I was testing something on a pentest this week and I had to tell it like do not modify data if you modify revert back. >> Yep. >> So if it's like changing my phone number or my my 2FA, you're not changing it and then like I can't get back into my account or changing my password and I can't get back in the account. I had this this problem happened to me uh last week where so I had a vulnerability and well it was kind of a chain. There was one that was a vulnerability but not without any security impact where I could bypass a like registration like registration was normally like disabled and I was able to to bypass authorization just to get like an account and I was able to get two accounts. Now I found a pretty impactful IOR. It was like a high um where one account could delete another account and Claude overnight found that vulnerability, deleted my second account, but by the time that I like was able to like check it in the morning, the team had noticed like my activity and fixed the way to bypass registration. And so I'm like, uh, I can't like I can't reproduce it anymore because I don't have a second account because they fixed the they fixed the the registration bypass. And so I I ended up having to just give them access to my to my one account and being like, this here's what I've got. And they they were able to they were able to confirm the vulnerability existed and um and actually and award it. But it was so stressful when when Triage came back and they're like, "We can't create an we can't create a uh a second you we can't create an account to test this. Are you sure it's still vulnerable?" And I'm like, "Oh god, I just spent like three days on this vulnerability." Um, you know, or I guess three days having Claude like look for vulnerabilities and finally found this one. And now Triage can't reproduce it and neither can I because they fixed part of it. So fortunately, I still got my bouncy, but it was it was a stressful Friday. I played that for free. Dude, as you were telling me about your account getting deleted, I was like, "Oh, please tell me cloud didn't go through and delete everybody's accounts." >> No. Goodness, no. >> Could you imagine? >> Yeah. Like I some I sometimes wonder how like how responsible programs will hold you. Like if if I specifically tell Claude like do not delete data. I repeat, do not delete data. And then Claw deletes data. It's like what what do I tell a program? >> I don't know. >> Whoops. >> Okay, let's see. Uh, honest status. So, club whenever has a bad news to tell you, it'll use the word honest. It's never >> using a gold mine. You found the gold mine. You hit the jackpot. It's honest. >> Finding the API. Okay. Maybe it does have maybe my session did not have access to the API. So, what I'm going to do is I'm going to make a request on the uh on harvest profit and I'm going to just give it my request. So, let's see. Where is harvestp profofit again? artistprofit.com. Okay, so I'm going to just hang tight while I grab I don't even have Kaido open right now, so I'm just going to have to grab it from the network tab. >> Speaking of Kaido, do you use the Kaido scale at all for any of these? >> No. No, but I know I need to. I know I need to. I I have to definitely recommend it, but I haven't set it up myself. Yeah, I mean it would be interesting to find like uh different syncs that you're looking for and like going through all your old data to find like excess that you may have missed from all these skills that you have. I think it' be a really interesting one to test out. >> Okay, so after turning on Kaido and capturing a request, I'm actually just going to give uh Claude my full like my entire request so it has the cookies. Okay. Um, I'll say here is a request to the API. Please use this authentication to look for further vulnerabilities. So, I just gave basically my entire request from um >> an example query that you're making with GraphQL. >> Yeah. So, yeah. So, it has my cookies, has the endpoint, and so now it should be able to actually look for stuff. And I've had to do that a number of times. Just give it a give it a single request so it knows what to do. >> Yeah. I mean, I don't know about you dude, but I freaking hate GraphQL and I feel like this is a easy way to go. Not my problem anymore. You figured out how cloud go. >> Exactly. Exactly. So, here here's Claude being like hyperbolic again. Massive in >> you know that it's like really serious when it starts cussing. like uh at some point it was like I found a I found a crit on um on Monday and it was like holy like okay >> I saw you post that. Yeah. >> Yeah. Yeah. It's so funny. I I don't know why it just I can't take Claude seriously when it uh when it says things like that. >> My immediate reaction to the gold mine thing. It's like massive gold mine. We just hit Jack. But I'm like relax dude. You haven't even done anything yet. But like chill. Like I lose my when we find a good bug, but like you're you I think we have a little bit more than usual. >> Highest EV I'm not sure what EV is. Uh highest EV test right now. If exposed without a authorization, every AG in the system is readable by ID. So the critical door, >> but you just to be clear, you don't have anything for GraphQL, right? You just have vulnerability types. It's just going to it's going based on the documentation in the JavaScript file and doing all this, right? >> Yeah, exactly. I'm not sure what these GIs are. So I can actually if you press like uh command O or control O, what was it? Is it control or command O? Yeah, control O. It'll like you'll be able to see the actual full request. >> It becomes verbose. >> Yeah. Well, not even verbose. Like you see where it says like all this like plus 19 lines, control O to expand. >> You by default can only see like the first like four lines. But if you're like, well, I actually want to know what those errors were. I want to know what this data was. >> Enumerating everything to user entity. It's just coming up with tasks and doing some findings at the same time. >> Yeah. Yeah. Yeah. See the node ID resolver uh for perm the error message distinguishes between exists but hidden and not found. Okay. So it's it's like it okay so it's kind of found in Oracle which isn't very exciting. Um >> I mean it's enumeration. It's a good finding for a pentest at least a not bug bounty but like >> or if you need to find a user ID for something else you can chain with you have this at least right >> yeah exactly exactly so yeah it's not not terribly exciting but I'll see so it's like before I do anything I could touch another user's data I want to confirm the purchase the two viable steps map the full schema by error buzzing or aggressive uh test right side authorization on the machine user or machine upsert mutation with another user's machine ID speed. >> One question that I have is so what you just showed me is practically what you do with all these applications. What about u like a blackbox approach? Let's say you go to this domain and it redirects you to an octa one login page but you want to test it out. Do you tell it like hey I want to just approach this target or do you give more context? Like how does that work? >> Uh sometimes I'll I'll just say I want to approach this target. Um, sometimes I'll say what the what the goals are, like um, I really want to find, um, you know, an authentication bypass. Only look for those. Um, occasionally I don't really know what I'm looking for, but I just know I want to bug. And this is this is often what I'll do, like if I'm going to bed at night and I'm kind of tired and I just want to like shoot my shot, I'll just say, >> um, here's this target. Find a way to find any vulnerabilities. Um, do not stop. Um I'll come back in the morning um and then it might come again I come back in the morning and it might say you know all paths are at dead ends and then occasionally I just say assume there is a vulnerability assume there is a vulnerability here go and find it or I'll tell it like I've already found a vulnerability here it's your job to find it even though I hadn't and just like get it to try harder and harder and harder and harder um and occasionally it just kind of like breaks through eventually >> so you're tricking it by pushing it to go harder and harder every time and help you with finding something and you say sometimes that works gaslighting LLM is another level, my friend. We're gaslighting modeled at this point in 2026. All right. >> Yeah. I mean, until until uh some like AI ethicists come out who are, you know, championing for uh for AI rights, I don't think that anyone's going to blame me. >> Somebody like me who has a history of vulnerabilities on Hacker One, what's my first, you know, five steps to do if I want to start doing this? I have never done. >> Yeah. So if you if you've got vulnerabilities on the Hacker One platform, absolutely give it give it to give it to Claude. Just uh tell give Claude your like hacker one API key or your bugout API key or whatever. Um say fetch all of my reports um and create skills to find vulnerabilities like the ones I've already found. Um Claude will do that. Um it can write its own skills. Um and then uh tell Claude or write it yourself, but tell Claude to uh create a templated agent agent file. that you can use on all targets that says explicitly that you're a bug bounty hunter and you only care about impactful bugs or bugs that you can show immediate security impact. You don't care about misconfigurations. You don't care about things that would just fill up a pentest report. You don't care about things that are theoretical or hypothetical. You only care about things that you can demonstrate real impact on real data. Um, and then once like once you have that agent file, your luck with cloud code will go way way way further. >> I think I'm gonna probably end mine with a P p or GTFO at the end of my cloud skill. >> Yeah, exactly. >> Just to make sure. >> Okay. But what about somebody who's got no historic, you know, let's say I'm a new bug bounty hunter because you also see the stories of like people that have never done bug bounties are finding vans using, you know, cloud code and things like that. What's the recommendation there? Do I just grab whatever PDF books I have and throw them on there? Do I do writeups for example? Like what's the next go-to? >> Well, uh fortunately uh most bug bounty platforms have disclosed vulnerabilities. And so like there is effectively no difference between uh vulnerabilities that you've written and vulnerabilities that you can access publicly because they've been disclosed. And so I would like point Claude at all disclosed Hacker One reports that have been paid because there's a lot of garbage that hasn't been paid. So, I could tell uh I tell Claude to look for all vulnerabilities that are publicly disclosed, you know, that are severity high or higher, greater um and have received a bounty. And then, you know, you've you've already populated your populated your skills with pretty valuable information >> or also go to like the top 20 bug bounty hunters that you know, go to their blog posts. >> Yeah, that too. >> Anything you want to add? any any any lessons you've learned from doing this that you want to share with anybody that's like yeah I wish I knew this when I first started because I would have saved a lot of more time than I do today. >> Yeah, it's that it's that like uh writing a good Asian file takes a lot of iterations. Like when I started my uh my cloud code was just looking for idors because that's all the that's all it knew how to do because of the the bugs that I reported or the bugs that I fed it. And so I had to tell it okay this is not like but I are valid but they're not really what I want you to do. So, I've gave it a like a ranking list like look for server side vulnerabilities first. Um, then kind of go down and look for lesser severe vulnerabilities later on. But like I really want to know about SSRFs. I really want to know about PII exposure. I really want to know about blind access um rce etc. Um I I think I said uh in my in my agent file like um uh PII is the you know is the the golden goose. Like most programs even most programs that follow the the platform standards will treat a mass PII leak as crit full stop. And so like if I can if I can find a way to leak other users names or email addresses or phone numbers like that's that's way it's way easier than trying to find like an RC. >> Yeah, absolutely. I mean it's it also pays up there too, right? It's uh it's still a >> uh critical. Yeah. >> Okay. Exactly. I'm going to I'm going to do this. I think we move for the next video. If you guys want to watch this, drop a comment. Maybe we'll make a agent file based on like public reports and see where it goes. >> Yeah, I think that'd be cool. Yeah, I' I'd love to to see that or be a part of it. And um uh because there's a lot of a lot of good reports and I imagine that a claude code who is fed only publicly disclosed reports would actually perform pretty well. >> All right, that's it. If you watch it all the way this far, thank you so much for sticking around. But also, if you want to watch me create a video around maybe using Burp Suite Websick Academy and creating our first skill, drop a comment saying Claude and I'll make sure to make one in one of the upcoming weeks. All right, that's it. I'll see you in next week's video. Peace.
Download Subtitles
These subtitles were extracted using the Free YouTube Subtitle Downloader by LunaNotes.
Download more subtitlesRelated Videos
Download Subtitles for CLAUDE CODE Full Course 2026
Enhance your learning experience with downloadable subtitles for the CLAUDE CODE FULL COURSE 4 HOURS: Build & Sell (2026). These captions help you follow along easily, improve comprehension, and revisit key concepts anytime. Perfect for learners who want clear, accessible content at their own pace.
Download Subtitles for MONEY EXPERTS: Earning $1 Million from $0
Access accurate subtitles for the MONEY EXPERTS video where strategies to make $1 million from scratch are revealed. Downloading captions helps you follow expert insights easily and improves comprehension of key financial tips.
Download Subtitles for 3 SIMPLE Ways to Make $2000 with AI
Easily download accurate subtitles for the video '3 SIMPLE Ways to Make $2000 with AI' and enhance your understanding of powerful AI money-making strategies. Improve accessibility, follow along effortlessly, and never miss a detail with our clear captions.
Download Subtitles for #1 Money Expert's 75/15/10 Wealth System
Access accurate subtitles for the #1 Money Expert's video on the 75/15/10 money system that helps build wealth regardless of your income. Downloading these captions ensures you grasp every detail of this powerful financial strategy to improve your money management skills.
Download Subtitles for Cheating Gold Digger | Financial Audit Video
Access accurate subtitles for the 'Cheating Gold Digger Is Destroying His Life' video to enhance your understanding and follow every detail of the financial audit story. Downloading subtitles ensures better comprehension and allows you to watch the video in various environments without missing key points.
Most Viewed
Descarga Subtítulos para NARCISISMO | 6 DE COPAS - Episodio 63
Accede fácilmente a los subtítulos del episodio 63 de '6 DE COPAS', centrado en el narcisismo. Descargar estos subtítulos te ayudará a entender mejor el contenido y mejorar la experiencia de visualización.
Subtítulos para TIPOS DE APEGO | 6 DE COPAS Episodio 56
Descarga los subtítulos para el episodio 56 de la tercera temporada de 6 DE COPAS, centrado en los tipos de apego. Mejora tu comprensión y disfruta del contenido en detalle con nuestros subtítulos precisos y accesibles.
Untertitel für 'Nicos Weg' Deutsch lernen A1 Film herunterladen
Laden Sie die Untertitel für den gesamten Film 'Nicos Weg' herunter, um Ihr Deutschlernen auf A1 Niveau zu unterstützen. Untertitel helfen Ihnen, Wortschatz und Aussprache besser zu verstehen und verbessern das Hörverständnis effektiv.
Download Subtitles for Your Favorite Videos Easily
Enhance your video watching experience by downloading accurate subtitles and captions. Enjoy better understanding, accessibility, and language support for all your favorite videos.
Download Subtitles for 'Asbestos is a Bigger Problem Than We Thought' Video
Access accurate and easy-to-read subtitles for the video 'Asbestos is a Bigger Problem Than We Thought' to enhance your understanding of this critical environmental and health issue. Download captions to follow along better, improve accessibility, and share information effectively.

