sir can i ask a question .....after collecting all the endpoints and parameters even after filtering out by GF tool how we can determine the parameter is vulnerable or not because there are so many links and also websites are secure by waf and how to determine it we can bypass it or not
Of course, Kanchan 😊 Great question After collecting parameters, test them with tools like Burp Suite or SQLmap to check for vulnerabilities. Focus on key parameters (like `id` or `search`), and look for unusual responses like errors or delays. To bypass WAF, try modifying payloads slightly (e.g., URL encoding or case changes). Patience and practice are key-keep experimenting and learning 🚀 If you need more help, feel free to ask. 😊
sir plz bring a whole series of bug bounty zero to advance
Thanks for subscribing 😊 Great idea-we’ll work on a 'Bug Bounty: Zero to Advance' series. Stay tuned 💻✨
@@CyberGita thnx buddy for taking in consideration for my requested series❤️❤️❤️
@epicsanime1950 Thanks for your support ❤️ Glad you liked the series-more exciting content coming soon 🚀😊
sir can i ask a question .....after collecting all the endpoints and parameters even after filtering out by GF tool how we can determine the parameter is vulnerable or not because there are so many links and also websites are secure by waf and how to determine it we can bypass it or not
Of course, Kanchan 😊 Great question After collecting parameters, test them with tools like Burp Suite or SQLmap to check for vulnerabilities. Focus on key parameters (like `id` or `search`), and look for unusual responses like errors or delays. To bypass WAF, try modifying payloads slightly (e.g., URL encoding or case changes). Patience and practice are key-keep experimenting and learning 🚀 If you need more help, feel free to ask. 😊
@@CyberGita thanks sir for clearing by doubt ☺
You're welcome, Kanchan 😊 Glad I could help. Keep learning