Тёмный

Bypassing 403 Forbidden API Call - Unauthorized Access | Bug Bounty POCs Episode 5 

rashahacks
Подписаться 1,3 тыс.
Просмотров 1,8 тыс.
50% 1

Опубликовано:

 

29 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 12   
@salmancheema3975
@salmancheema3975 Год назад
your tutorial is gorgeous bro... Keep it up... Nice... I have subscribe your channel. 😊❤
@normalitee0os
@normalitee0os Год назад
Man that's a cool bug. Bro i wanted to ask though, what according to you is the correct way for fuzzing APIs?
@siddusiddesh9726
@siddusiddesh9726 Год назад
U r not changing any id of other user how can u access user 2
@rashahacks
@rashahacks Год назад
I have a testing account and the IDs are accessible publicly if you are part of the workspace.
@falgunsoni1521
@falgunsoni1521 Год назад
Is this cuz of poor backend build?
@rashahacks
@rashahacks Год назад
No the backend stack and operations are awesome for this application. By the way, this application belongs to one of the fortune 100 companies. But, the way the authorization was handled here is incorrect. It should always be handled via your session through cookies or Auth token whereas here it was handled using a parameter Code which was useless, since the parameter of use was the objectID only.
@falgunsoni1521
@falgunsoni1521 Год назад
so it (here: Code) must be encrypted and specific for every user. Would that fix the issue? And tokens are the easiest and best alternatives for prevention of hacking right?
@monKeman495
@monKeman495 Год назад
bruh i take a look of your all commendable youtube poc i'm much intrigue in what kind of bug you found on disney, twitter, reddit, yahoo i got cache and xxe recent bug tagged as informative and couldn't find anything on that scope i'm hooning on that same target for over 2 months
@kalki-fo3ie
@kalki-fo3ie Год назад
Looking forward to see similar content❤ Keep Going
@UCyohViaSVeHd2drDZVK2noQ
@UCyohViaSVeHd2drDZVK2noQ Год назад
Nice explanation
@sstecharray8209
@sstecharray8209 Год назад
cool
@rajeshsagar3912
@rajeshsagar3912 Год назад
osm bro🎉
Далее
3 Real API Bugs I got a bounty for
17:43
Просмотров 10 тыс.
I Took An iPhone 16 From A POSTER! 😱📱 #shorts
00:18
How Hackers Write Malware & Evade Antivirus (Nim)
24:04
Android App Bug Bounty Secrets
20:14
Просмотров 102 тыс.
Cracking JSON Web Tokens
14:34
Просмотров 57 тыс.
Scraping Dark Web Sites with Python
19:29
Просмотров 153 тыс.
API Hacking With ChatGPT!
13:28
Просмотров 26 тыс.
How to Directory Brute Force Properly
11:45
Просмотров 29 тыс.
How To Start Bug Bounty 2023
11:38
Просмотров 82 тыс.
Hacking Tools (with demos) that you need to learn in 2024
1:27:34