Sept. 30, 2023, 11 a.m. | Bug Bounty Reports Explained

Bug Bounty Reports Explained

Full video:
📕 The full case study:
📧 Subscribe to BBRE Premium:
✉️ Sign up for the mailing list:
📣 Follow me on Twitter:

This video is a part of the case study of 187 IDOR bug bounty reports. In this part, I take a look at what types of IDs were used by vulnerable applications and, where relevant, how did the hunters predict them.

applications bounty bug bug bounty case hunters idor ids predict relevant reports study types video vulnerable

Humbly Confident Security Lead

@ YNAB | Remote

Information Technology Specialist II: Information Security Engineer

@ WBCP, Inc. | Pasadena, CA.

Director of the Air Force Cyber Technical Center of Excellence (CyTCoE)

@ Air Force Institute of Technology | Dayton, OH, USA

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Cybersecurity Subject Matter Expert

@ QinetiQ US | Washington, DC, United States

Program Cybersecurity Manage (F/M/X)

@ Alstom | Villeurbanne, FR