Bug Bounty Basics Ethical Hacking for Beginners | Cyber Gita

Поділитися
Вставка
  • Опубліковано 10 січ 2025

КОМЕНТАРІ •

  • @epicsanime1950
    @epicsanime1950 21 день тому +1

    sir plz bring a whole series of bug bounty zero to advance

    • @CyberGita
      @CyberGita  21 день тому +1

      Thanks for subscribing 😊 Great idea-we’ll work on a 'Bug Bounty: Zero to Advance' series. Stay tuned 💻✨

    • @epicsanime1950
      @epicsanime1950 21 день тому +1

      @@CyberGita thnx buddy for taking in consideration for my requested series❤️❤️❤️

    • @CyberGita
      @CyberGita  20 днів тому

      @epicsanime1950 Thanks for your support ❤️ Glad you liked the series-more exciting content coming soon 🚀😊

  • @kanchan524
    @kanchan524 19 днів тому +1

    sir can i ask a question .....after collecting all the endpoints and parameters even after filtering out by GF tool how we can determine the parameter is vulnerable or not because there are so many links and also websites are secure by waf and how to determine it we can bypass it or not

    • @CyberGita
      @CyberGita  19 днів тому +1

      Of course, Kanchan 😊 Great question After collecting parameters, test them with tools like Burp Suite or SQLmap to check for vulnerabilities. Focus on key parameters (like `id` or `search`), and look for unusual responses like errors or delays. To bypass WAF, try modifying payloads slightly (e.g., URL encoding or case changes). Patience and practice are key-keep experimenting and learning 🚀 If you need more help, feel free to ask. 😊

    • @kanchan524
      @kanchan524 19 днів тому +1

      @@CyberGita thanks sir for clearing by doubt ☺

    • @CyberGita
      @CyberGita  18 днів тому +1

      You're welcome, Kanchan 😊 Glad I could help. Keep learning