123┌▄──────────────────────────────────────────────────────────────────────▄┐4├■▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀■[ YESWEHACK PROPHILE ON ZaX ]■▄▀▄▀▄▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄┤5├■──────────────────────────────────────────────────────────────────────■┤6├■▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀■┤7└▀──────────────────────────────────────────────────────────────────────▀┘823th of May, 2021.9╔══════════════════════════════════ WHOIS ═══════════════════════════════╗10║ Handle: ZaX ║11║ AKA: Brice Augras ║12║ Age of your body: 30 ║13║ Produced in: FR ║14║ Urlz: https://bzhunt.fr ║15║ Computers: Buying i9 NUCs too often :D ║16║ Active Since: 2017 ║17║ Superpowers: Deserialization ║18║ Life in a sentence: Forget you don't know and keep learning ║19╚════════════════════════════════════════════════════════════════════════╝2021 QUOTES22╔════════════════════════════════════════════════════════════════════════╗23║ "Did I read the manual ? #RTFM" ║24║ "Sharing is caring" ║25╚════════════════════════════════════════════════════════════════════════╝2627 ARMORY28╔════════════════════════════════════════════════════════════════════════╗29║ Hunting with @doomer ║30║ BurpSuite Pro ║31║ Nuclei ║32║ Ysoserial <3, AspDotNetWrapper ║33╚════════════════════════════════════════════════════════════════════════╝343536▀▄█▓▒░ Hello, who are you?37│ ─────────────────────────────────────────────────────────────────────────38└─ Hi, I'm Brice Augras, founder of BZHunt company & Infosec Researcher.39I had the chance to grow with computers, Internet and all this kind of juicy40stuff :)414243▀▄█▓▒░ Can you relate your first successful exploitation/abuse of a system?44│ ─────────────────────────────────────────────────────────────────────────45└─ When I was like 15 years old, I had quite severe restrictions at home46regarding allowed time to spent on the Internet (thxs Dad). I needed to find47a way to circumvent the restriction and thanks to Google, I discovered that48it was possible to "crack" WI-FI WEP encryption key of my neighbour (shame49on me, completely illegal).505115 years later (and after raising a true ethical approach regarding infosec),52this memory is still the strongest one since that was the first time I put a53feet inside "hacking" field. From there, I kept discovering the wild world of54IT, coding and pwning. I literally love the mindset behind hacking :)555657▀▄█▓▒░ What moment pushed you in the pro computer security whirlpool?58│ ─────────────────────────────────────────────────────────────────────────59└─ A little bit of chance, a lot of RNG but overall a lot of time spent60learning and improving my technical skills since I didn't had any diploma.61To be honest, I struggled quite a lot 6 years back while trying to find a job.62So, seeing where I am right now is like the biggest gift I could have offered63myself.646566▀▄█▓▒░ Memorable people or readings you care to share about?67│ ─────────────────────────────────────────────────────────────────────────68└─ All the hunters publishing #DeutscheQualitat write-ups on online platforms69& open-source tools.707172▀▄█▓▒░ What will you learn next?73│ ─────────────────────────────────────────────────────────────────────────74└─ To-Do list is quite big but one of my favorite topic would be : Blockchains75attack scenarios.767778▀▄█▓▒░ Three most important rules you would write in a Bug Hunter Manifesto?79│ ─────────────────────────────────────────────────────────────────────────80└─ Eat, Pwn, Sleep, Repeat.81Be careful with impostor syndrome and burnouts and never forget to enjoy ;)828384▀▄█▓▒░ You are active on YesWeHack and have practiced others BB platforms,85| What are your Do/Don't?86| What are your expectations ?87│ ─────────────────────────────────────────────────────────────────────────88└─ Building a long term relationship with the customers. Enjoying programs89with a lot of activity.909192▀▄█▓▒░ What advice can you give to someone who wants to start in93│ bug bounty?94│ ─────────────────────────────────────────────────────────────────────────95└─ Don't be afraid and "JUSTT DOOO ITTTT". I was literraly impressed 3-4 years96ago, doubting about my ability to find even one valid vulnerability. For the97newcomers, I would just say : "start digging with only one kind of target or98vulnerability and keep increasing your knowledge about it. You'll rapidly99notice that this will end up working and success will come!"100101102▀▄█▓▒░ Is there a life AFK?103│ ─────────────────────────────────────────────────────────────────────────104└─ Fixing old sports car & house renovation. A bit crazy since I almost lost105a finger with this kind of activity (keyboard with 9 fingers, less practical106haha)...107108109▀▄█▓▒░ How do you see the future?110│ ─────────────────────────────────────────────────────────────────────────111└─ Cybersecurity needs from the companies will keep increasing for sure for112the incoming years. Can't wait to see how infosec stuff will evolve on topics113such as AI, Blockchain, Smart Cities. I would take the bet that we'll discover114new attack vectors.115116--------[ EOF117118

YESWEHACK PROPHILE ON ZAX
June 14, 2021
