Рет қаралды 26,529
Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
This video was sponsored by Detectify (detectify.com)
Buy Me Coffee:
www.buymeacoffee.com/nahamsec
Live Every Sunday on Twitch:
/ nahamsec
Free $100 DigitalOcean Credit:
m.do.co/c/3236319b9d0b
Follow me on social media:
/ nahamsec
/ nahamsec
twitch.com/nahamsec
hackerone.com/nahamsec
/ nahamsec1
Github:
github.com/nahamsec
Nahamsec's Discord:
discordapp.com/invite/ucCz7uh
0:00 Intro
2:30 A1: Broken Access Control
3:56 A2: Cryptographic Failures
4:35 A3: Injections
6:41 A4: Insecure Design
8:30 A5: Security Misconfiguration
10:06 A6: Vulnerable and Outdated Components
11:30 A7: Identification and Authentication Failures
12:42 A8: Software and Data Integrity Failures
14:02 A9: Security Logging and Monitoring Failures
14:49 A10: Server-Side Request Forgery (SSRF)
17:35 Resources