3 Proven Techniques to Get Your Bug Bounty Report Accepted!

  Рет қаралды 1,817

BePractical

BePractical

Күн бұрын

Are you struggling to get your bug bounty reports accepted? You’re not alone! In this video, I’ll share 3 proven techniques that can help you elevate your submissions from "informative" to "accepted." Whether you’re just starting out or looking to sharpen your skills, these strategies are designed to make your reports stand out and increase your chances of success.
Join me as I break down each technique with practical examples and tips you can implement right away. Let’s take your bug bounty journey to the next level!
Don’t forget to like, subscribe, and hit the bell icon for more tips on bug hunting and ethical hacking!
Previous Video: • Chaining Vulnerabiliti...
XSS + Cors: • Chaining Vulnerabiliti...
Self XSS to Account Takeover: • BUG BOUNTY TIPS: SELF ...
ClickJacking Protection Bypass: • BUG BOUNTY TUTORIAL: B...
Website: bepractical.tech
Telegram: telegram.me/be...
Previous Video: • Covering The Under Rat...
The Art Of Web Reconnaissance:
www.udemy.com/...
Hacking Windows with Python from Scratch: www.udemy.com/...
The Ultimate Guide to Hunt Account Takeover:
www.udemy.com/...

Пікірлер: 9
@nandheeshganeshkumar4087
@nandheeshganeshkumar4087 10 сағат бұрын
bro i reported an xss but they replied as - you are inserting the script in your own browser console. So how do i show the reflected xss ?
@NauSikhiya-sf3gf
@NauSikhiya-sf3gf 12 сағат бұрын
bro can you tell then whenever someone got session token in url or tls cookie i mean i have seen many guys but those are informative so for that can you tell for this ??
@abhijith.r.jeevanath405
@abhijith.r.jeevanath405 Күн бұрын
no offence i am a beginner at bug bounty but under my reading most opportunities in hackerone clickjacking out of scope. so I hope would like to speak with you as a beginner I have so many doubts
@BePracticalTech
@BePracticalTech Күн бұрын
If you read the scope carefully, you will notice that most of them says "Clickjacking on non authenticated pages" are out of scope! Which means that if you can find clickjacking on those endpoints which requires authentication and has impact then in most of the cases, your report will be accepted!
@SameerAhmad-gt4fe
@SameerAhmad-gt4fe Күн бұрын
Wanna collab?
@SecureByBhavesh
@SecureByBhavesh Күн бұрын
First 🥇
@ajpresents5317
@ajpresents5317 Күн бұрын
How old are you and how you started because i am currently a learner in bug bounty and know basics and struggling to learn the vulnerabilities and cant understand the labs what should i do ❤
@learnfirst-1
@learnfirst-1 Күн бұрын
If you are not intrested or not understand concept. Than you are struggling entire life. Find your inside capabilities in any feild. And start growing.
Live XSS Exploit: Using XSSFuzz to Break CSP on a Real Target!
19:26
escape in roblox in real life
00:13
Kan Andrey
Рет қаралды 93 МЛН
规则,在门里生存,出来~死亡
00:33
落魄的王子
Рет қаралды 24 МЛН
Bug Bounty: Content Discovery on Large Scope Like a Pro! | 2024
13:53
Bug Hunting is easy if you KNOW this
8:23
Bug Hunter Labs
Рет қаралды 26 М.
Bug Bounty: Subdomain Takeover Vulnerability | 2024
13:38
BePractical
Рет қаралды 9 М.
Bug Bounty Hunting - Tools I Use
15:45
HackerSploit
Рет қаралды 401 М.
The Insane World Of North Korean Hackers
19:19
Cipher
Рет қаралды 318 М.
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Рет қаралды 1,4 МЛН