Common Open Redirection Bug Bounty Mistakes

  Рет қаралды 6,391

codingo

codingo

Күн бұрын

Пікірлер: 37
@ibotah
@ibotah 10 ай бұрын
I should have watched this before I submitted what I thought was an open redirect because your first example with the "@" operator was the mistake I made. Which resulted in me having a non-appiclable. LOL. Oh well, you live and learn right? I am now using this opportunity to educate myself and understand better. Thank you always codingo!
@exploreThe_
@exploreThe_ 8 ай бұрын
same here bro, I too done the same mistake before 2 weeks. Have u found how to escalate it ? If yes can u share please
@ca7986
@ca7986 3 жыл бұрын
Triagger interaction like that really helps to understand the triagger minds.
@elite_fitness
@elite_fitness 3 жыл бұрын
I watch a lot of bug bounty videos and you're my favorite , for sure top 3. I'd kill to have a 30 minute convo with you lol. #codingo
@renganathanofficial
@renganathanofficial 3 жыл бұрын
I really loved your content in recent days, you're just awesome ♥️
@codingo
@codingo 3 жыл бұрын
Thankyou, that means a lot!
@abartandhakal4122
@abartandhakal4122 3 жыл бұрын
Great insight mate. Thanks for sharing.
@codingo
@codingo 3 жыл бұрын
Glad you enjoyed it!
@kittoh_
@kittoh_ 3 жыл бұрын
Awesome content sir! PS: It would be convenient if the links you're mentioning are in the description. Ofc, Except for the giveaways. Thank you!
@codingo
@codingo 3 жыл бұрын
I agree but unfortunately KZbin tends to ban if you link out to hacking content.. I've found it's safer to keep them on the video as callouts instead, sorry!
@kittoh_
@kittoh_ 3 жыл бұрын
@@codingo daaaamn! KZbin is such a crybaby 😂 Anyways, great content sir!
@shekharwagh4982
@shekharwagh4982 3 жыл бұрын
Thanx for Open Redirect Clarification.Wish to request you , if its possible for you to make a small Video on the Bug Status Timeline .Most of the Bug Bounty Hunters are Unaware of the Timeline for Bugs getting resolved/fixed & ultimately being paid Bug Bounty, after the Bug is confirmed by the Security Team. Most of the time there is no communication from the Security Team to the Bug Hunters for a long time . This leads to Anxiety/Frustration among the Bug Hunters. For example , Google VRP team confirmed 2 Bugs as P3 & P4 and the status is assigned & open . Its been this way for last 40 days . Apple VRP is getting Bad Reputation among the Bug Hunters . A Video on the Bug Status Timeline will go a long way to help Bug hunters .Thanx once again for all your Videos.
@codingo
@codingo 3 жыл бұрын
Good call, I'll look at working it into another video I have planned
@shayansec
@shayansec Жыл бұрын
Great vid as usual.
@dublinnnn
@dublinnnn Жыл бұрын
Indian Audience >>>>>>>>>>>>>>>>>>>>
@2weektv739
@2weektv739 3 жыл бұрын
Superb !
@aminumuhammed3114
@aminumuhammed3114 3 жыл бұрын
Nice one, i really like videos concentrated on fundamentals
@codingo
@codingo 3 жыл бұрын
Appreciate the feedback! Some more of these coming, SSRF will be the next one
@harshbanshpal
@harshbanshpal 2 жыл бұрын
@@codingo Waiting for the SSRF topic #BlindSSRF🥴
@broomandmopmop
@broomandmopmop 2 ай бұрын
CODINGO!!!!!!!!
@Luffy-um8jo
@Luffy-um8jo 3 жыл бұрын
Hello Sir, Can you give some tips to get valid bugs? I am trying to hunt some bugs but most of them are closing as N/A or Duplicate.
@codingo
@codingo 3 жыл бұрын
I pepper them through videos, once beginner content is completed (about 6mo of backlog first), I'll get onto more "how to hack" content
@rafajanicki2456
@rafajanicki2456 3 жыл бұрын
If it's Duplicate - that means it IS VALID BUG and you have found it - and you should be absolutely proud of yourself :) You just weren't the first one to find it.
@shashankawasthii7620
@shashankawasthii7620 3 жыл бұрын
Great sir.. ❤❤
@mnageh-bo1mm
@mnageh-bo1mm 10 ай бұрын
Sensible points.
@gurvirsingh4190
@gurvirsingh4190 3 жыл бұрын
Great ❤️❤️
@codingo
@codingo 3 жыл бұрын
Thank-you!
@DipakSharma-dc1bu
@DipakSharma-dc1bu 3 жыл бұрын
present sir
@codingo
@codingo 3 жыл бұрын
o>
@ilikeapple8551
@ilikeapple8551 2 жыл бұрын
Nice beard xD
@codingo
@codingo 2 жыл бұрын
Thank-you!
@shrirangkahale
@shrirangkahale 3 жыл бұрын
;)
@ramitawil93
@ramitawil93 3 жыл бұрын
FIRST
@abartandhakal4122
@abartandhakal4122 3 жыл бұрын
:p so you won this time eh!
Why do you Duplicate so much with Bug Bounties?
6:55
codingo
Рет қаралды 10 М.
Hacking on Bug Bounties for a Living
12:59
codingo
Рет қаралды 18 М.
Don't look down on anyone#devil  #lilith  #funny  #shorts
00:12
Devil Lilith
Рет қаралды 48 МЛН
Mom had to stand up for the whole family!❤️😍😁
00:39
Миллионер | 2 - серия
16:04
Million Show
Рет қаралды 1,6 МЛН
小蚂蚁会选到什么呢!#火影忍者 #佐助 #家庭
00:47
火影忍者一家
Рет қаралды 121 МЛН
Open Redirect and How to Find It | Hacking Bug Bounty
13:36
Ryan John
Рет қаралды 10 М.
Bug Bounty Fundamentals: Scope
11:35
codingo
Рет қаралды 6 М.
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
19:58
Bug Bounty Reports Explained
Рет қаралды 15 М.
How to Write Great Bug Bounty Reports
11:48
The Cyber Mentor
Рет қаралды 17 М.
Open Redirect Vulnerability Explained
8:34
PwnFunction
Рет қаралды 168 М.
The 3 Tools You Need // How To Bug Bounty
10:02
NahamSec
Рет қаралды 31 М.
Exploiting Web Cache Poisoning
16:17
CyberSecurityTV
Рет қаралды 15 М.
Fundamentals of Bug Bounty Recon
12:39
codingo
Рет қаралды 26 М.
Learn Nuclei in 30 minutes - DEF CON Nuclei Demo
35:48
ProjectDiscovery
Рет қаралды 11 М.
Don't look down on anyone#devil  #lilith  #funny  #shorts
00:12
Devil Lilith
Рет қаралды 48 МЛН