IDOR with EXIF Vulnerability | Bug Bounty POC

  Рет қаралды 7,244

Jiiva hacks

Jiiva hacks

Күн бұрын

#hacker #hack #hackers #hacking #bountytool
#hackingtools #bugbountytool # #programming
#python
#coder #bugbountypoc #bugbountyhunting #cybersecurity
#ethicalhacking #openbugbounty
#educationalfuzzer #bruteforce #bugbounty
#bugcrowd #hackerone
#eductionalvideo
#informationtechnology #informationsecurity

Пікірлер: 18
@anuzravat
@anuzravat 3 ай бұрын
what does exif have anything to do with vuln 😭, its obv any media will have meta data.. IDOR is crazy tho
@ArnoShortz
@ArnoShortz 11 күн бұрын
its the impact, it would be interesting to test other headers here
@bugbouty
@bugbouty 3 ай бұрын
nice
@DerrikWrevok
@DerrikWrevok 2 ай бұрын
I always start with subdomain enum. Anyone smarter suggest better methodology? Thx. Also, sweet vid.
@jitendrabehera2374
@jitendrabehera2374 3 ай бұрын
Are they accept this bug and give you any bounty
@sushil.choudhary_
@sushil.choudhary_ 3 ай бұрын
I got 500$ for it
@rollups-
@rollups- 2 ай бұрын
yes
@smmeurope
@smmeurope 29 күн бұрын
no ımpact
@mistDexploit
@mistDexploit 2 ай бұрын
so EXIF was for making the IDOR more dangerous, actually you increased the Impact of vulnerability with showing that you can find victim location that was nice, I enjoyed it
@meedmexi3711
@meedmexi3711 3 ай бұрын
اخلا دار بوه
@杨志-w9h
@杨志-w9h 2 ай бұрын
cool
@thechannelofmine
@thechannelofmine Ай бұрын
No impact
@g0l0kget
@g0l0kget Ай бұрын
can u tell me why no impact? since theres no access control to view data another user
@thechannelofmine
@thechannelofmine Ай бұрын
@@g0l0kget The data being viewed already public and have no impact on the user or platform.
@g0l0kget
@g0l0kget Ай бұрын
@@thechannelofmine isee , so theres only impact if he can change another user detail . is that it? sorry im still learning
@thechannelofmine
@thechannelofmine Ай бұрын
@@g0l0kget no, not only change, you need to GET sensitive users information not public ones.
@g0l0kget
@g0l0kget Ай бұрын
@@thechannelofmine isee okay2 thanks
Inside Out 2: BABY JOY VS SHIN SONIC 3
00:19
AnythingAlexia
Рет қаралды 9 МЛН
Brawl Stars Edit😈📕
00:15
Kan Andrey
Рет қаралды 56 МЛН
Turning unexploitable XSS into an account takeover with Matan Berson
23:46
Bug Bounty Reports Explained
Рет қаралды 11 М.
How I made 1k in a day with IDORs! (10 Tips!)
23:09
InsiderPhD
Рет қаралды 52 М.
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
19:58
Bug Bounty Reports Explained
Рет қаралды 15 М.
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 1,8 МЛН
Running Nuclei On All My Bug Bounty Programs
10:45
NahamSec
Рет қаралды 17 М.
Testing XSS Tools On Target Protected By WAF | 2024
16:20
BePractical
Рет қаралды 10 М.