How to hack WordPress?
21:08
10 ай бұрын
Пікірлер
@Brocauli
@Brocauli Күн бұрын
Can you invite matanber. I wanna learn how he started client side attack.
@Rookeradk
@Rookeradk Күн бұрын
Hey !! Can you please invite matanber and do interview with him like how did he started client side hacking and how did he learn it. You promise me 2 months back that you will bring him 😢
@keppubgpc
@keppubgpc 2 күн бұрын
This man makes the best videos helped me gain a lot of knowledge
@bhismpitamah267
@bhismpitamah267 2 күн бұрын
Please fo make tutorial on RCE or Xss for beginners sir ,this video is very much Helpful ,hope u make more videos 🎉,God bless you sir 🎉❤
@justlisten6479
@justlisten6479 4 күн бұрын
Please what tool do you use for the table is it notion?
@BugBountyReportsExplained
@BugBountyReportsExplained 4 күн бұрын
correct
@ofcourseiuseunix
@ofcourseiuseunix 4 күн бұрын
Dude you literally did 160+ report reviews? dang! Appreciated.
@_bergee_
@_bergee_ 4 күн бұрын
As usual, the platinum content. Thanks. One day I found a privilege esc bug within half an hour (I was already familiar with the program back then). Encouraged by that, I was looking for similar types of bugs in this program for 4 hours and found nothing more :)
@BugBountyReportsExplained
@BugBountyReportsExplained 4 күн бұрын
I do it all the time😂 I find something and assume that the website will have a lot of problems with the same thing and I'm often proven wrong. But I think it's a good approach nevertheless.
@_bergee_
@_bergee_ 3 күн бұрын
@@BugBountyReportsExplained This is the reality of BB hunting :)
@TOP1-r6q
@TOP1-r6q 4 күн бұрын
🔥🔥🔥🔥
@BugBountyReportsExplained
@BugBountyReportsExplained 4 күн бұрын
Before you ask, the database with the reports and the rest of the privilege escalation case study are available in the BBRE Premium archive: members.bugbountyexplained.com/bypassing-admin-checks-and-more-privilege-escalation-case-study/
@isaac2243able
@isaac2243able 5 күн бұрын
Do they list any resources for learning mobile bug bounty???
@hamzakhaled1144
@hamzakhaled1144 5 күн бұрын
dsa
@hamzakhaled1144
@hamzakhaled1144 5 күн бұрын
TEST
@djniuq
@djniuq 9 күн бұрын
Awesome story and experience and you even did listen to your own recent posted podcast to ease your state.
@XhantiMzozoyana-zs6rq
@XhantiMzozoyana-zs6rq 10 күн бұрын
Yes sir, cross-site scripting (XXS) 1:00 🤣🤣🤣
@ImKidriani
@ImKidriani 12 күн бұрын
Noted
@danishbhat1536
@danishbhat1536 12 күн бұрын
He is such a nice person. i really enjoy this podcast. Thanks for an amazing content.
@razmjumehdi9069
@razmjumehdi9069 13 күн бұрын
Please answer my question. If I inject another user's cookie in the same way instead of another user's cookie and it accepts me and shows the second user's information, can I report it? Is it considered a valid report and will they reward me?
@razmjumehdi9069
@razmjumehdi9069 13 күн бұрын
For IDOR testing, if we see a random user ID in the target but we can see the information of the supposed victim, can we report it on hackerone? Will they accept it as a valid report from me? Or is it better not to report?
@ImKidriani
@ImKidriani 14 күн бұрын
@dittonachan
@dittonachan 16 күн бұрын
Nice inside ❤
@Rogerson112
@Rogerson112 17 күн бұрын
Keep going!
@piratedmedia
@piratedmedia 17 күн бұрын
I really like sir, louis thoughts towards the community.
@rohitborate5126
@rohitborate5126 17 күн бұрын
I finally recognized the voice from the walkthrough in Pentesterlab😅
@devanshuthanvi731
@devanshuthanvi731 9 күн бұрын
You guys have subscription? I am planning to buy , can you please provide me review?
@_bergee_
@_bergee_ 18 күн бұрын
PL is a great portal but as soon as you're in, there is a temptation to solve a lot of labs one by one. If you only do it once and never go back, you WILL forget very quickly what you've learned. Most of the things I learned and remember very well were techniques and tips used while exploiting bugs in the wild doing bug bounty.
@bughunter9766
@bughunter9766 18 күн бұрын
Mr. Louis love his work.. Still providing the training platform in affordable price. Which I use to learn in right path. Waiting for the black Friday offers
@AlecMaly
@AlecMaly 19 күн бұрын
Pentesterlab is such a great platform, nice guest & episode. Thank you!
@fantasm0-
@fantasm0- 19 күн бұрын
Been using pentesterlab for quite a while. Louis is a great guy. Wonderful platform.
@MFoster392
@MFoster392 19 күн бұрын
Great info as usual :)
@normalitee0os
@normalitee0os 19 күн бұрын
I really love the way Louis is passionate about his work ! Loved it all!
@anhucpham460
@anhucpham460 19 күн бұрын
Love your videooo.
@skytest1247
@skytest1247 19 күн бұрын
damn this setup is just next level. You people are increasing the benchmark in infosec
@HairEEck
@HairEEck 19 күн бұрын
What's the name of the site your friend used at 8:45 ?
@wilpta
@wilpta 19 күн бұрын
DomPurify?
@BugBountyReportsExplained
@BugBountyReportsExplained 19 күн бұрын
it was DOM Purify's GitHub repo
@animeghsarania1076
@animeghsarania1076 19 күн бұрын
I am still not able to distinguish between public and private ip address. Like when I use Kali in VM to even try to get ping back from a lab inside the VM. I simply don't get any response back. Can anyone share any resource to learn what to do in such scenarios
@ImKidriani
@ImKidriani 17 күн бұрын
Hey you are not far from the truth,I also has these issue and remember sending him a message. You have to get a public ip,paid ngrok or a vps should work. Just research the difference between a public up and private ip
@animeghsarania1076
@animeghsarania1076 9 күн бұрын
@@ImKidriani Can u share any writeup or any resource that would help me
@ImKidriani
@ImKidriani 9 күн бұрын
@@animeghsarania1076 just google or ask an llm to explain it.
@reymijares7368
@reymijares7368 19 күн бұрын
<SVG onload=confirm(1)>
@meooow5996
@meooow5996 19 күн бұрын
PentesterLab offers amazing content! I hope they add UPI payment as an option for Indian students to make payments more easily. This would be a great way to encourage more students to learn cybersecurity.
@louisnyff
@louisnyff 19 күн бұрын
Unfortunately, the payment gateway we use still doesn't offer this option :/
@dittonachan
@dittonachan 19 күн бұрын
Great video, loved it. <3 please make a video on signature wrapping attack.
@k0ns0l
@k0ns0l 19 күн бұрын
Woop woop!
@grassy-p12
@grassy-p12 19 күн бұрын
Amazing bg🎉❤
@BugBountyReportsExplained
@BugBountyReportsExplained 19 күн бұрын
Thank you for watching the video and welcome to the comment section. If you enjoyed it, please leave a like so that the algorithm knows you enojyed it ;)
@hypedz1495
@hypedz1495 22 күн бұрын
Well. Unfortunately its becoming really oversaturated
@Cuy1y0
@Cuy1y0 23 күн бұрын
Super interesting interview, thanks a lot 😊
@RVIZX9
@RVIZX9 23 күн бұрын
Awesome! Congrats 🎉
@hunter-bh5qc
@hunter-bh5qc 25 күн бұрын
the trick is to run checks on all field of valnurbiltys. not one.
@danishbhat1536
@danishbhat1536 26 күн бұрын
To be honest i am also doing the same shit😂
@studiospan6426
@studiospan6426 26 күн бұрын
3:01 I actually found a webserver vulnerable to this misconfiguration which was directly interacting with it's google firebase database without any sort of proxy, i used a simple curl command to interact with it's firebase directly and realised i could simply hijack any user image then i crawled the webapp using katana and found some of the sensitive information such as vendors introductory videos was stored on the same db and i could easily delete all of them.
@azharabdussami8726
@azharabdussami8726 27 күн бұрын
.
@dittonachan
@dittonachan 27 күн бұрын
Can you please make a video about your methodology?
@BugBountyReportsExplained
@BugBountyReportsExplained 21 күн бұрын
Every piece of content I create contains bits of my methodology
@Artorias-l3i
@Artorias-l3i 27 күн бұрын
Yes!
@Openaicom
@Openaicom Ай бұрын
Hey i found a bug or vunerbality in company that gives me access to the data another users , means like i can access data many users i want , like their personal things, ,,, is this critical bug ? Like eligible for payout,, please reply
@_bergee_
@_bergee_ Ай бұрын
Congratulations! Hard work pays off.
@advocatemack
@advocatemack Ай бұрын
Such great advice on this channel