Can you invite matanber. I wanna learn how he started client side attack.
@RookeradkКүн бұрын
Hey !! Can you please invite matanber and do interview with him like how did he started client side hacking and how did he learn it. You promise me 2 months back that you will bring him 😢
@keppubgpc2 күн бұрын
This man makes the best videos helped me gain a lot of knowledge
@bhismpitamah2672 күн бұрын
Please fo make tutorial on RCE or Xss for beginners sir ,this video is very much Helpful ,hope u make more videos 🎉,God bless you sir 🎉❤
@justlisten64794 күн бұрын
Please what tool do you use for the table is it notion?
@BugBountyReportsExplained4 күн бұрын
correct
@ofcourseiuseunix4 күн бұрын
Dude you literally did 160+ report reviews? dang! Appreciated.
@_bergee_4 күн бұрын
As usual, the platinum content. Thanks. One day I found a privilege esc bug within half an hour (I was already familiar with the program back then). Encouraged by that, I was looking for similar types of bugs in this program for 4 hours and found nothing more :)
@BugBountyReportsExplained4 күн бұрын
I do it all the time😂 I find something and assume that the website will have a lot of problems with the same thing and I'm often proven wrong. But I think it's a good approach nevertheless.
@_bergee_3 күн бұрын
@@BugBountyReportsExplained This is the reality of BB hunting :)
@TOP1-r6q4 күн бұрын
🔥🔥🔥🔥
@BugBountyReportsExplained4 күн бұрын
Before you ask, the database with the reports and the rest of the privilege escalation case study are available in the BBRE Premium archive: members.bugbountyexplained.com/bypassing-admin-checks-and-more-privilege-escalation-case-study/
@isaac2243able5 күн бұрын
Do they list any resources for learning mobile bug bounty???
@hamzakhaled11445 күн бұрын
dsa
@hamzakhaled11445 күн бұрын
TEST
@djniuq9 күн бұрын
Awesome story and experience and you even did listen to your own recent posted podcast to ease your state.
@XhantiMzozoyana-zs6rq10 күн бұрын
Yes sir, cross-site scripting (XXS) 1:00 🤣🤣🤣
@ImKidriani12 күн бұрын
Noted
@danishbhat153612 күн бұрын
He is such a nice person. i really enjoy this podcast. Thanks for an amazing content.
@razmjumehdi906913 күн бұрын
Please answer my question. If I inject another user's cookie in the same way instead of another user's cookie and it accepts me and shows the second user's information, can I report it? Is it considered a valid report and will they reward me?
@razmjumehdi906913 күн бұрын
For IDOR testing, if we see a random user ID in the target but we can see the information of the supposed victim, can we report it on hackerone? Will they accept it as a valid report from me? Or is it better not to report?
@ImKidriani14 күн бұрын
❤
@dittonachan16 күн бұрын
Nice inside ❤
@Rogerson11217 күн бұрын
Keep going!
@piratedmedia17 күн бұрын
I really like sir, louis thoughts towards the community.
@rohitborate512617 күн бұрын
I finally recognized the voice from the walkthrough in Pentesterlab😅
@devanshuthanvi7319 күн бұрын
You guys have subscription? I am planning to buy , can you please provide me review?
@_bergee_18 күн бұрын
PL is a great portal but as soon as you're in, there is a temptation to solve a lot of labs one by one. If you only do it once and never go back, you WILL forget very quickly what you've learned. Most of the things I learned and remember very well were techniques and tips used while exploiting bugs in the wild doing bug bounty.
@bughunter976618 күн бұрын
Mr. Louis love his work.. Still providing the training platform in affordable price. Which I use to learn in right path. Waiting for the black Friday offers
@AlecMaly19 күн бұрын
Pentesterlab is such a great platform, nice guest & episode. Thank you!
@fantasm0-19 күн бұрын
Been using pentesterlab for quite a while. Louis is a great guy. Wonderful platform.
@MFoster39219 күн бұрын
Great info as usual :)
@normalitee0os19 күн бұрын
I really love the way Louis is passionate about his work ! Loved it all!
@anhucpham46019 күн бұрын
Love your videooo.
@skytest124719 күн бұрын
damn this setup is just next level. You people are increasing the benchmark in infosec
@HairEEck19 күн бұрын
What's the name of the site your friend used at 8:45 ?
@wilpta19 күн бұрын
DomPurify?
@BugBountyReportsExplained19 күн бұрын
it was DOM Purify's GitHub repo
@animeghsarania107619 күн бұрын
I am still not able to distinguish between public and private ip address. Like when I use Kali in VM to even try to get ping back from a lab inside the VM. I simply don't get any response back. Can anyone share any resource to learn what to do in such scenarios
@ImKidriani17 күн бұрын
Hey you are not far from the truth,I also has these issue and remember sending him a message. You have to get a public ip,paid ngrok or a vps should work. Just research the difference between a public up and private ip
@animeghsarania10769 күн бұрын
@@ImKidriani Can u share any writeup or any resource that would help me
@ImKidriani9 күн бұрын
@@animeghsarania1076 just google or ask an llm to explain it.
@reymijares736819 күн бұрын
<SVG onload=confirm(1)>
@meooow599619 күн бұрын
PentesterLab offers amazing content! I hope they add UPI payment as an option for Indian students to make payments more easily. This would be a great way to encourage more students to learn cybersecurity.
@louisnyff19 күн бұрын
Unfortunately, the payment gateway we use still doesn't offer this option :/
@dittonachan19 күн бұрын
Great video, loved it. <3 please make a video on signature wrapping attack.
@k0ns0l19 күн бұрын
Woop woop!
@grassy-p1219 күн бұрын
Amazing bg🎉❤
@BugBountyReportsExplained19 күн бұрын
Thank you for watching the video and welcome to the comment section. If you enjoyed it, please leave a like so that the algorithm knows you enojyed it ;)
@hypedz149522 күн бұрын
Well. Unfortunately its becoming really oversaturated
@Cuy1y023 күн бұрын
Super interesting interview, thanks a lot 😊
@RVIZX923 күн бұрын
Awesome! Congrats 🎉
@hunter-bh5qc25 күн бұрын
the trick is to run checks on all field of valnurbiltys. not one.
@danishbhat153626 күн бұрын
To be honest i am also doing the same shit😂
@studiospan642626 күн бұрын
3:01 I actually found a webserver vulnerable to this misconfiguration which was directly interacting with it's google firebase database without any sort of proxy, i used a simple curl command to interact with it's firebase directly and realised i could simply hijack any user image then i crawled the webapp using katana and found some of the sensitive information such as vendors introductory videos was stored on the same db and i could easily delete all of them.
@azharabdussami872627 күн бұрын
.
@dittonachan27 күн бұрын
Can you please make a video about your methodology?
@BugBountyReportsExplained21 күн бұрын
Every piece of content I create contains bits of my methodology
@Artorias-l3i27 күн бұрын
Yes!
@OpenaicomАй бұрын
Hey i found a bug or vunerbality in company that gives me access to the data another users , means like i can access data many users i want , like their personal things, ,,, is this critical bug ? Like eligible for payout,, please reply