Nov. 9, 2023, 1:23 p.m. | Bug Bounty Reports Explained

Bug Bounty Reports Explained www.youtube.com

📚 Access full case study here: https://members.bugbountyexplained.com/how-to-make-money-for-dos-bugs-dos-case-study/
📧 Subscribe to BBRE Premium: https://bbre.dev/premium
✉️ Sign up for the mailing list: https://bbre.dev/nl
📣 Follow me on Twitter: https://bbre.dev/tw

This video is a part of the case study of 138 DoS bug bounty reports. In this part, I take a look at what types of DoSes I've observed.

🖥 Get $100 in credits for Digital Ocean: https://bbre.dev/do

Timestamps:

00:00 Intro
00:36 Examples of a regular Server-side DoS
5:55 client-side DoS
8:50 Software …

api bounty bug bug bounty cache cache poisoning case client client-side dos google google maps key maps poisoning regular reports server software study timestamps types video

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC