Weak Authentication [InsecureBankv2 APK]

  Рет қаралды 3,665

Intigriti

Intigriti

Күн бұрын

Пікірлер: 9
@komradz5577
@komradz5577 Жыл бұрын
didnt know Steve Aoki was hacker
@intigriti
@intigriti Жыл бұрын
👩‍🎤🎸🤘
@komradz5577
@komradz5577 Жыл бұрын
@@intigriti hes actually doing a better job hacking :D
@entertainment_in_blood
@entertainment_in_blood 5 ай бұрын
its been 10 month .. and i came here for the 12th time to see if the video has been uploaded or not :(
@intigriti
@intigriti 5 ай бұрын
😣 We will try and resume the mobile and game hacking videos at some stage! There's only so much resources and bug bounty is mostly web-focused so that's where a lot of it goes.
@gta-ks1mi
@gta-ks1mi 8 ай бұрын
Please dont neglect the Android series because I reported 2 RCEs today after watching this video and race condition is involved
@intigriti
@intigriti 8 ай бұрын
Hey, we might resume this series at some stage (along with the game hacking). Mobile isn't the easiest area to make content and isn't my area of expertise (or interest tbh xD). Also, bare in mind a lot of this content is educational and may not apply to bug bounty, e.g. one of these videos is on rooting the device, another on bypassing root detection - things which are important for mobile hacking, but almost always out of scope in bug bounty. Race conditions are another similar issue, e.g. lack of rate limiting can be considered a vulnerability, but one that is often explicitly out of scope in bug bounty. If you want to reach out and tell me more about your reports, and any responses to them - I'm over on go.intigriti.com/discord 😉
@happyjester
@happyjester Жыл бұрын
where is next video ?
@intigriti
@intigriti Жыл бұрын
Not sure when the next episode of this series will be, we'll try to continue it at some point!
Aggressive Scanning in Bug Bounty (and how to avoid it)
18:18
Intigriti
Рет қаралды 2,2 М.
Performing CSRF Exploits Over GraphQL
10:36
Intigriti
Рет қаралды 1,5 М.
This mother's baby is too unreliable.
00:13
FUNNY XIAOTING 666
Рет қаралды 43 МЛН
Exploiting Vulnerabilities in LLM APIs
5:41
Intigriti
Рет қаралды 2 М.
Misconfig Mapper - Hacker Tools
4:53
Intigriti
Рет қаралды 2,5 М.
Finding a Hidden GraphQL Endpoint
7:51
Intigriti
Рет қаралды 1,4 М.
Exploiting LLM APIs with Excessive Agency
9:28
Intigriti
Рет қаралды 1,4 М.
Introduction to GraphQL Attacks
18:50
Intigriti
Рет қаралды 2 М.
Bypassing GraphQL Brute Force Protections
7:12
Intigriti
Рет қаралды 1 М.
Exploiting Insecure Output Handling in LLMs
12:58
Intigriti
Рет қаралды 974
AUTOMATE XSS WITH DALFOX AND WAF BYPASS PAYLOADS.
33:05
FIXITGEARWARE-SECURITY
Рет қаралды 433
This mother's baby is too unreliable.
00:13
FUNNY XIAOTING 666
Рет қаралды 43 МЛН