#NahamCon2024

  Рет қаралды 5,599

NahamSec

NahamSec

Күн бұрын

Пікірлер: 15
@ZarakKhanNiazi
@ZarakKhanNiazi 5 ай бұрын
BBRE guy is the only person who cares about eyesight of content consumers, he used large fonts which we can read easily
@BugBountyReportsExplained
@BugBountyReportsExplained 19 күн бұрын
You're welcome ;)
@KarahannAe
@KarahannAe 5 ай бұрын
18:24 if anyone else was also confused when he says POST-AUTH REDIRECT he is talking about after the Oauth dance is over, he doesnt mean POST based oauth flow.
@BugBountyReportsExplained
@BugBountyReportsExplained 19 күн бұрын
I see how this can be confusing. Since then, I have changed how I say this part to after-auth redirect to be clearer.
@so3litude_
@so3litude_ 5 ай бұрын
Even though the state parameter is present in the request you should always check for CSRF I've found many targets vulnerable to this . Most of the people leave as soon as they see State parameter in the request. This happens because of misconfig in OUath flow where it doesen't validate the state parameter server side . It only checks if it is present or not.
@deporison
@deporison 5 ай бұрын
Also the login csrf is still possible because we still have the state and we can send it to the user
@BugBountyReportsExplained
@BugBountyReportsExplained 5 ай бұрын
very true! The presence doesn't mean it's checked
@heller64
@heller64 5 ай бұрын
most site now uses strict url validation on redirect_uri not even extra dot can be added btw thx greg
@MarkFoudy
@MarkFoudy 5 ай бұрын
Thanks Ben!
@MianHizb
@MianHizb 5 ай бұрын
this was nice
@bughunter9766
@bughunter9766 5 ай бұрын
Thanks Ben and Enjoooooooy 😊
@ZarakKhanNiazi
@ZarakKhanNiazi 5 ай бұрын
I love and enjoy hearing him say enjoy
@bughunter9766
@bughunter9766 5 ай бұрын
@@ZarakKhanNiazi All of us like it 😁✌️✌️✌️
@InfoSecIntel
@InfoSecIntel 5 ай бұрын
Hey brother can you add these to the playlist
@hamzabohra5083
@hamzabohra5083 5 ай бұрын
Second
BLIND XSS ATTACK PRACTICAL AND THEORY ( bug bounty content )
10:11
secure technical
Рет қаралды 959
Vulnerability Hunting Strategies | Master of Bug Bounty
51:40
Ahmed Najeh
Рет қаралды 2,1 М.
МЕНЯ УКУСИЛ ПАУК #shorts
00:23
Паша Осадчий
Рет қаралды 5 МЛН
Noodles Eating Challenge, So Magical! So Much Fun#Funnyfamily #Partygames #Funny
00:33
When u fight over the armrest
00:41
Adam W
Рет қаралды 32 МЛН
How To Choose Mac N Cheese Date Night.. 🧀
00:58
Jojo Sim
Рет қаралды 94 МЛН
Logarithmic shifter
21:16
ECE VIDEOS
Рет қаралды 3
The Blueprint to Your First $1,000+ Bounty
12:14
NahamSec
Рет қаралды 6 М.
My Favorite API Hacking Vulnerabilities & Tips
10:08
NahamSec
Рет қаралды 15 М.
OAuth 2.0 explained with examples
10:03
ByteMonk
Рет қаралды 160 М.
HACKING OAuth 2.0 FOR BEGINNERS!
10:26
Farah Hawa
Рет қаралды 44 М.
#NahamCon2024: GraphQL is the New PHP | @0xlupin
26:17
NahamSec
Рет қаралды 8 М.
Android App Bug Bounty Secrets
20:14
LiveOverflow
Рет қаралды 104 М.
Open Redirect Leading to OAuth Access Token Disclosure!
15:36
Intigriti
Рет қаралды 14 М.
Cross-Site Request Forgery (CSRF) Explained
11:59
NahamSec
Рет қаралды 24 М.
#NahamCon2024: .js Files Are Your Friends | @zseano
24:04
NahamSec
Рет қаралды 10 М.
МЕНЯ УКУСИЛ ПАУК #shorts
00:23
Паша Осадчий
Рет қаралды 5 МЛН