all InfoSec news
Top hunters think about everything when submitting a report #bugbounty #bugbountytips
Sept. 26, 2023, 11 a.m. | Bug Bounty Reports Explained
Bug Bounty Reports Explained www.youtube.com
📕 The full case study: https://members.bugbountyexplained.com/how-to-make-money-with-idors-idor-case-study/
📧 Subscribe to BBRE Premium: https://bbre.dev/premium
✉️ Sign up for the mailing list: https://bbre.dev/nl
📣 Follow me on Twitter: https://bbre.dev/tw
This video is a part of the case study of 187 IDOR bug bounty reports. In this part, I take a look at what types of IDs were used by vulnerable applications and, where relevant, how did the hunters predict them.
applications bounty bug bug bounty case hunters idor ids predict relevant reports study types video vulnerable
More from www.youtube.com / Bug Bounty Reports Explained
HTTP Multiline headers #bugbounty #bugbountytips #bugbountyhunter
1 week, 2 days ago |
www.youtube.com
Browser-powered desync #bugbounty #bugbountytips #bugbountyhunter
1 week, 3 days ago |
www.youtube.com
Client-side path traversal #bugbounty #bugbountytips #bugbountyhunter
1 month, 1 week ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Data Privacy Manager m/f/d)
@ Coloplast | Hamburg, HH, DE
Cybersecurity Sr. Manager
@ Eastman | Kingsport, TN, US, 37660
KDN IAM Associate Consultant
@ KPMG India | Hyderabad, Telangana, India
Learning Experience Designer in Cybersecurity (f/m/div.) (Salary: ~113.000 EUR p.a.*)
@ Bosch Group | Stuttgart, Germany
Senior Security Engineer - SIEM
@ Samsara | Remote - US