BUG BOUNTY: SERVER SIDE REQUEST FORGERY | LIVE WEBSITE | 2023

  Рет қаралды 9,071

BePractical

BePractical

Күн бұрын

Пікірлер: 49
@BePracticalTech
@BePracticalTech Жыл бұрын
On this special ocassion of Diwali, Enlighten your knowledge by grabbing both of my courses for maximum discount! Bug Bounty: The Ultimate Guide to Hunt Account Takeover: www.udemy.com/course/the-ultimate-guide-to-hunt-account-takeover/?couponCode=LEARNTHISDIWALI Hacking Windows With Python Course: www.udemy.com/course/hacking-windows-with-python-from-scratch-2022/?couponCode=LEARNTHISDIWALI
@bugxdtesterr
@bugxdtesterr Жыл бұрын
When I saw your first video I did not know about anything the exploiting process on some vulnerabilities, now Im in the leader board in one bug bounty platform. Thanks a lot for full detailed videos
@BePracticalTech
@BePracticalTech Жыл бұрын
Great to hear!
@comosaycomosah
@comosaycomosah 6 күн бұрын
appreciate you bro you have some GREAT in detail videos
@SOBHITSHARMA
@SOBHITSHARMA Жыл бұрын
Great video, finally someone could explain it in easy method.
@BePracticalTech
@BePracticalTech Жыл бұрын
Glad you liked it!
@novianindy887
@novianindy887 2 ай бұрын
so to mitigate it, we should not put url/http as url parameter?
@Marty_YouTuber
@Marty_YouTuber Жыл бұрын
awesome video i love this channel i will learn a lot.
@TezaRock
@TezaRock Жыл бұрын
VERY NICELY EXPLAINED.
@BePracticalTech
@BePracticalTech Жыл бұрын
Glad it was helpful!
@IbrahimAbubakar0011
@IbrahimAbubakar0011 Жыл бұрын
Wow be practice I'm very feel happy when i saw your video i learn alot from you
@BePracticalTech
@BePracticalTech Жыл бұрын
Glad to hear that
@jay25inteserve
@jay25inteserve Жыл бұрын
Great content my friend
@BePracticalTech
@BePracticalTech Жыл бұрын
Thank you
@морс-ф3д
@морс-ф3д Жыл бұрын
great video! brilliant knowledge
@BePracticalTech
@BePracticalTech Жыл бұрын
Glad you liked it!
@cybersecurity3962
@cybersecurity3962 Жыл бұрын
kzbin.info/www/bejne/Y2G8iIuLo7ulfNU
@prudhvikonakalla9605
@prudhvikonakalla9605 Жыл бұрын
Bro please make playlist on oscp
@kr36820
@kr36820 Жыл бұрын
Same
@cybersecurity3962
@cybersecurity3962 Жыл бұрын
kzbin.info/www/bejne/Y2G8iIuLo7ulfNU
@mdhussain5177
@mdhussain5177 Жыл бұрын
Videos are nice. I understand, thank you. Also, what is the name of that cool wallpaper, bro??
@BePracticalTech
@BePracticalTech Жыл бұрын
It is pre installed in kali
@aejazzzz2298
@aejazzzz2298 Жыл бұрын
Yes bro make playlist on oscp
@mohmino4532
@mohmino4532 Жыл бұрын
nice bro this is easier method to get Origin IP
@BePracticalTech
@BePracticalTech Жыл бұрын
Yeah thanks
@Code7659
@Code7659 6 ай бұрын
If found on a bug bounty platform.. can this be reported as a ssrf vulnerability all you'd have to go a bit further?? Awesome video I'm glad to be learning from your platforms
@BePracticalTech
@BePracticalTech 6 ай бұрын
Well, It depends on the program rules. Generally, you need to dive a bit deeper into SSRF before reporting to the companies. However, some companies may pay you bounties depending on their rules
@ProtonKing
@ProtonKing 10 ай бұрын
impact is low for blind SSRF or may be non (informative)
@raj-p3d
@raj-p3d Жыл бұрын
Can we use this website for testing server side request forgery?
@robinhood3001
@robinhood3001 Жыл бұрын
Please make a video on WordPress admin login bypass
@asshu2004
@asshu2004 Жыл бұрын
Pls make a playlists pls
@prudhvikonakalla9605
@prudhvikonakalla9605 Жыл бұрын
waiting for part 2 bro.
@CodewizardSumit
@CodewizardSumit 7 ай бұрын
🔥🔥🔥
@SOBHITSHARMA
@SOBHITSHARMA Жыл бұрын
How to learn more about google dorks?
@BePracticalTech
@BePracticalTech Жыл бұрын
There are lot of medium articles that you can refer to. Or you can wait for it to be released on this channel
@PRATHMESH-f8w
@PRATHMESH-f8w Жыл бұрын
What if we use burp collaborator client instead of ngrok? can we get origin ip of server in this case ?
@BePracticalTech
@BePracticalTech Жыл бұрын
Yes, you will
@PRATHMESH-f8w
@PRATHMESH-f8w Жыл бұрын
@@BePracticalTech I tried it and iam getting result :)
@the_py_coder
@the_py_coder Жыл бұрын
Which screen recorder you are using
@BePracticalTech
@BePracticalTech Жыл бұрын
Obs
@the_py_coder
@the_py_coder Жыл бұрын
@@BePracticalTech can you share its configurations and there is no watermark
@Techbeam
@Techbeam Жыл бұрын
Can u we use burp collaborator for this
@BePracticalTech
@BePracticalTech Жыл бұрын
Yes, you can
@rajeshpv8960
@rajeshpv8960 Жыл бұрын
Bro first you give the calarity of previous question and then do your next video, please don't make fool to all or don't do further videos if you don't have caliber to resolve the comments, guys don't follow his video until you get the clarity
@BePracticalTech
@BePracticalTech Жыл бұрын
Hi there, I hope you are doing well. We always try our best to resolve the issues which are mentioned in the comment as soon as possible but you see, we have over 100+ videos now and it is a bit difficult for us to go through each comments on each videos one by one. But still, if your questions were ever ignored, you can always join the telegram channel where over 2k+ members can help you to resolve the issues.
@livebughunting9393
@livebughunting9393 Жыл бұрын
Its just finding broo .. if possible to do exploit 😊
@BePracticalTech
@BePracticalTech Жыл бұрын
releasing soon
@AdityaAlfiki
@AdityaAlfiki 2 ай бұрын
you are valid bro?
SSRF EXPLOITATION: FILE DISCLOSURE | 2023 | BUG BOUNTY
9:41
BePractical
Рет қаралды 7 М.
ТЮРЕМЩИК В БОКСЕ! #shorts
00:58
HARD_MMA
Рет қаралды 2,6 МЛН
風船をキャッチしろ!🎈 Balloon catch Challenges
00:57
はじめしゃちょー(hajime)
Рет қаралды 96 МЛН
BUG BOUNTY: EXPLOITING SSRF WITH AUTOMATION | 2023
12:23
BePractical
Рет қаралды 9 М.
Server-Side Request Forgery (SSRF) Explained
15:58
NahamSec
Рет қаралды 29 М.
How much money I made in my 1st year of bug bounty? Bounty vlog #4
17:02
Bug Bounty Reports Explained
Рет қаралды 164 М.
ADVANCED BUG BOUNTY TUTORIAL: BUSINESS LOGIC VULNERABILITY | 2023
15:45
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
19:58
Bug Bounty Reports Explained
Рет қаралды 16 М.
how is this hacking tool legal?
11:42
Low Level
Рет қаралды 407 М.
Live XSS Exploit: Using XSSFuzz to Break CSP on a Real Target!
19:26
ТЮРЕМЩИК В БОКСЕ! #shorts
00:58
HARD_MMA
Рет қаралды 2,6 МЛН