all InfoSec news
How to turn a write-based path traversal into a critical? - Bug bounty case study
May 16, 2023, 1:16 p.m. | Bug Bounty Reports Explained
Bug Bounty Reports Explained www.youtube.com
💽 The full article and database with those reports: https://members.bugbountyexplained.com/how-to-maximise-payouts-for-file-disclosure-bugs-file-disclosure-case-study/
✉️ Sign up for the mailing list: https://bbre.dev/nl
📣 Follow me on twitter: https://bbre.dev/tw
This video presents an analysis of disclosed bug bounty reports about write-based path traversal vulnerabilities. Specifically, it's about what files you should write to show the maximum impact of a path traversal like this, ideally escalating it to RCE.
🖥 Get $100 in credits for Digital Ocean: https://bbre.dev/do
Report:
Reporter's …
analysis bounty bug bug bounty directory file files impact path path traversal rce report reporter reports safe shell twitter video vulnerabilities writing
More from www.youtube.com / Bug Bounty Reports Explained
Client-side path traversal #bugbounty #bugbountytips #bugbountyhunter
3 weeks, 5 days ago |
www.youtube.com
CSRF - how to find it in 2024? CSRF bug bounty case study
4 weeks, 2 days ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Information Systems Security Officer (ISSO), Junior
@ Dark Wolf Solutions | Remote / Dark Wolf Locations
Cloud Security Engineer
@ ManTech | REMT - Remote Worker Location
SAP Security & GRC Consultant
@ NTT DATA | HYDERABAD, TG, IN
Security Engineer 2 - Adversary Simulation Operations
@ Datadog | New York City, USA