$25k GitHub account takeover & justCTF 2023 CSRF+XSS writeup

  Рет қаралды 5,313

Bug Bounty Reports Explained

Bug Bounty Reports Explained

Күн бұрын

Пікірлер
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
💻 Challenge yourself in 2024 justCTF online teaser: 2024.justctf.team Sponsored by: HexRays - get 20% off for IDA pro training sessions with exclusive code BBRE20: bbre.dev/hexrays Trail of Bits: cutt.ly/veucZatb OtterSec: cutt.ly/leucL7cz SECFORCE: cutt.ly/5eoKRyNL
@princewilliam7876
@princewilliam7876 5 ай бұрын
Where I can learn more about namespace tokenizor and parser
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
look for mutation xss. Articles by Michał Bentkowski are great. Also, recently in BBRE Premium I covered a talk about it
@Zizo8182
@Zizo8182 5 ай бұрын
Thanks for sharing
@eduardopereira2718
@eduardopereira2718 3 ай бұрын
really cool video. thanks
@Username8281
@Username8281 5 ай бұрын
Amazing channel. Does anyone know any similar channels?
@kuroketsueki9059
@kuroketsueki9059 5 ай бұрын
Nahamsec but BBRE is more detailed IMO
@PhilocyberWithRichie
@PhilocyberWithRichie 5 ай бұрын
No fucking way you have a Mate behind you!! hahaha you are great dude! Good video thanks for sharing!
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
Mate is now my necessary equipment for work😏
@monKeman495
@monKeman495 5 ай бұрын
is preflight request with strict referer or sop policy before post or put request can thwart the payload ?
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
thwart?
@monKeman495
@monKeman495 5 ай бұрын
@@BugBountyReportsExplained sorry it's stop , in my case program use put method for adding information to account but put method block the cors request .so i tried using __method=get and some other tricks like using in with origin set with src but no luck
@steiner254
@steiner254 5 ай бұрын
nice!
@Quantum_Playz78
@Quantum_Playz78 5 ай бұрын
2nd view × 2nd comment × 2nd liked = 1 subscriber. Fact I already subscribed your channel more than a year.
@zzzzzzzzZzZZzzzaZzz
@zzzzzzzzZzZZzzzaZzz 5 ай бұрын
Thanks for your report and efforts. Unfortunately, the vulnerability has already been reported and thus your report will be marked as duplicate
@ediopaul0
@ediopaul0 Ай бұрын
@@zzzzzzzzZzZZzzzaZzz LOL
@0xshahriar
@0xshahriar 5 ай бұрын
1st view + 1st comment
@data_eng_tuts
@data_eng_tuts 5 ай бұрын
Yeah, bug bounty hunting is shit !
Turning unexploitable XSS into an account takeover with Matan Berson
23:46
Bug Bounty Reports Explained
Рет қаралды 14 М.
When Cucumbers Meet PVC Pipe The Results Are Wild! 🤭
00:44
Crafty Buddy
Рет қаралды 59 МЛН
А я думаю что за звук такой знакомый? 😂😂😂
00:15
Денис Кукояка
Рет қаралды 4,3 МЛН
#NahamCon2024: OAuth Secret | @BugBountyReportsExplained
20:44
The Big Headless CMS Lie (James Mikrut)
18:14
Vercel
Рет қаралды 69 М.
CSRF - how to find it in 2024? CSRF bug bounty case study
15:29
Bug Bounty Reports Explained
Рет қаралды 8 М.
Web Server Concepts and Examples
19:40
WebConcepts
Рет қаралды 260 М.
DHH discusses SQLite (and Stoicism)
54:00
Aaron Francis
Рет қаралды 100 М.
How to do account takeover? Case study of 146 bug bounty reports
30:23
Bug Bounty Reports Explained
Рет қаралды 11 М.
Free Hacking API courses (And how to use AI to help you hack)
53:46
David Bombal
Рет қаралды 118 М.
Where are all the RCEs? RCE case study
25:12
Bug Bounty Reports Explained
Рет қаралды 8 М.
The React Interview Questions You need to Know
21:29
CoderOne
Рет қаралды 45 М.
When Cucumbers Meet PVC Pipe The Results Are Wild! 🤭
00:44
Crafty Buddy
Рет қаралды 59 МЛН