all InfoSec news
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
Oct. 26, 2022, 4:17 p.m. | Bug Bounty Reports Explained
Bug Bounty Reports Explained www.youtube.com
The blogpost with case study methodology: https://bbre.dev/ssrfs
✉️ Sign up for the mailing list: https://bbre.dev/nl
📣 Follow me on twitter: https://bbre.dev/tw
I pulled 361 bug bounty reports from the web to make a case study and see how people are making money with SSRFs. From this video, you can learn what functionalities are most often vulnerable to Server-Side Request Forgery in these disclosed reports and also some of my opinions on which of them …
More from www.youtube.com / Bug Bounty Reports Explained
HTTP Multiline headers #bugbounty #bugbountytips #bugbountyhunter
2 days, 16 hours ago |
www.youtube.com
Browser-powered desync #bugbounty #bugbountytips #bugbountyhunter
3 days, 16 hours ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Regional Leader, Cyber Crisis Communications
@ Google | United Kingdom
Regional Intelligence Manager, Compliance, Safety and Risk Management
@ Google | London, UK
Senior Analyst, Endpoint Security
@ Scotiabank | Toronto, ON, CA, M1K5L1
Software Engineer, Security/Privacy, Google Cloud
@ Google | Bengaluru, Karnataka, India
Senior Security Engineer
@ Coinbase | Remote - USA