June 13, 2023, 3:21 p.m. | Bug Bounty Reports Explained

Bug Bounty Reports Explained www.youtube.com

📕 The full case study: https://bbre.dev/atocs
📧 Subscribe to BBRE Premium: https://bbre.dev/premium
✉️ Sign up for the mailing list: https://bbre.dev/nl
📣 Follow me on Twitter: https://bbre.dev/tw

I studied 146 disclosed bug bounty reports and in this video, I'm showing you what techniques for taking over an account are most common.

Videos mentioned:
https://youtu.be/HnI0w156rtw
https://youtu.be/MXH1HqTFNm0
https://youtu.be/ZFst3-r-9Lg
https://youtu.be/pk7oYuz4x0Q
https://youtu.be/JiMzpjgAXv8

Timestamps:

00:00 Intro
00:30 Clickjacking
3:14 Pre-account takeover
5:36 Direct authentication bypass
13:22 SSO takeover
23:11 Reset victim's password

account account takeover authentication authentication bypass bounty bug bug bounty bypass clickjacking password reports reset sso takeover techniques victim video videos

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg

@ Hifield | Strasbourg, France

Lead Security Specialist

@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas

Consultant SOC / CERT H/F

@ Hifield | Sèvres, France