[Part I] Bug Bounty Hunting for IDORs and Access Control Violations

Поділитися
Вставка
  • Опубліковано 16 січ 2025

КОМЕНТАРІ • 132

  • @2.5wc
    @2.5wc 9 місяців тому +20

    Finally someone explaining with real website. I was looking for this..This was very easy to follow as a beginner in bug bounty hunting,

  • @deepakthakkar5482
    @deepakthakkar5482 10 місяців тому +41

    Finally someone shares real life experience in bug bounty and actually shows how real world works. Thank you

  • @rs0n_live
    @rs0n_live  Рік тому +46

    Hey Everyone! Just want to give a quick update on my IDORs and Access Controls Part III video:
    As I'm recording this video, I'm realizing that this will end up being another 4-5 hour recording 😨, and as much as I want to get this video out to the community, I also don't want to rush it.
    Now that we've got the basic knowledge from the last two videos, I think I have a really great opportunity to take my time and demonstrate a very effective and cohesive methodology. Then downside is that it simply takes time to get all that knowledge in the video.
    I promise I will get this video out to y'all as soon as I can! However, I also promise not to rush out an inferior video just to keep my numbers up in the algorithm, which hopefully is better for everyone!

  • @ASecurityPro
    @ASecurityPro 10 місяців тому +8

    This is the best educational bug bounty video on youtube!

  • @alexandersoltesz8103
    @alexandersoltesz8103 Рік тому +8

    How long have I been waiting for someone to actually test on a live application!! So educative, more of these pls!!

  • @kittoh_
    @kittoh_ Рік тому +20

    Great video man! This is substantial knowledge. Awesome! Other creators don't share things like this due to the fact they make more competition in bug bounty.

    • @broomandmopmop
      @broomandmopmop Рік тому +1

      allot of their excuses I have heard is its not allowed to do live bug bounty tests not sure how thats true

    • @dcybershark
      @dcybershark Рік тому +1

      Sharing knowledge builds a strong community, but very few have such wisdom.

    • @broomandmopmop
      @broomandmopmop Рік тому

      That and they won’t burn recon live I’d do live recon with u if u wanted to invite me.

    • @blackbird436
      @blackbird436 10 місяців тому

      Yes, there is a ban on publishing the bug bounty process, but the creator's explanation is great for beginners like me. It helps to step up, when others are asked how to report a valid bug, even if it's a duplicate, person simply replies "watch youtube"

  • @lalit7562
    @lalit7562 8 місяців тому +5

    finally someone sharing how to hunt in real life rather than giving tips thanks sir

  • @ShotArcane
    @ShotArcane Рік тому +3

    This is the best educational bug bounty video on youtube!

  • @j-makkk5208
    @j-makkk5208 Рік тому +5

    i love the video and how you explain everything and go down paths even tho you most likely know its wrong you test until its confirmed really helps a new guy like me learn the methodology keep up the good work!!!

  • @rbjunior22
    @rbjunior22 Рік тому +2

    You are SO awesome for lending your expertise to walk through your methodology on a live program! Thank you!!!

  • @HackAll-ue3sr
    @HackAll-ue3sr Рік тому +3

    can't find better video like this on the youtube , Really a leader u are to beginners.. Please keep on uploading with different vulnerabilities so that our knowledge keeps increasing.😇

  • @Luxiel610
    @Luxiel610 4 місяці тому +1

    i love the way of how you're taking notes man and that really enlightens me.. maybe i should do the same when bug hunting and setting up pointers.. you have my full respect brother!

  • @neoXXquick
    @neoXXquick Рік тому +9

    When person understands what he is doing, its always good to listen to him. Great video.. keep a good work

  • @Gray3ther
    @Gray3ther Рік тому +1

    You have the Holy Grail of certs! So glad you're on our side!! 😁

  • @TylerFLMHD
    @TylerFLMHD 2 місяці тому

    I dont think i have ever left a comment on a youtube video, but i just wanted to reach out and thank you for this! the way you sit and explain the little details is just amazing. Its almost like you can hear me mumbing to myself "wtf does that mean" lmao
    Definitely gained me as a subscriber!

  • @slaozeren8742
    @slaozeren8742 6 місяців тому

    Teşekkürler.

  • @pubgbattlegroundindiaoffic4414
    @pubgbattlegroundindiaoffic4414 5 місяців тому

    Finally someone explaining with real website. I was looking for this..This was very easy to follow as a beginner in bug bounty hunting.

  • @antonyjose2231
    @antonyjose2231 Рік тому +5

    Awesome content love these in-depth videos

  • @Ghosty_ToastyXD
    @Ghosty_ToastyXD Місяць тому

    Definately the most helpful videos on bug bounty answered so many questions i had about the industry now im confident i can actually find some bugs

  • @jamesvelopmenthagood8998
    @jamesvelopmenthagood8998 6 місяців тому

    This is so much better than course videos with super unrealistic flaws

  • @Firstlovecricket18
    @Firstlovecricket18 7 днів тому

    No one beat this content ❤

  • @Sam-ob1ud
    @Sam-ob1ud 17 днів тому

    thanks for the content man..that was great ❤
    can't wait for further lives ❤

  • @feedomomics8103
    @feedomomics8103 Рік тому

    Please do more vids like this, on specific bug types from beginner to advanced this is gold.

  • @ahmedmouad344
    @ahmedmouad344 10 місяців тому +1

    Thank you so much i really learned from you, i also learned how to be patient with captcha like which is an amazing skill ngl

  • @naderelfeel3858
    @naderelfeel3858 2 місяці тому

    that was great ❤
    can't wait for further lives ❤

  • @fabianmendoza61
    @fabianmendoza61 Рік тому

    Thank you for sharing this knowledge with us. As someone who is new to this, videos like this are golden in helping understand the how and why.

  • @architsharma4666
    @architsharma4666 Рік тому +1

    Best yt video about idor

  • @harshraj5771
    @harshraj5771 7 місяців тому

    thank you for coming with such great videos

  • @ZHENZHANG-cr1lr
    @ZHENZHANG-cr1lr 7 місяців тому

    The majority of logical flaws are inherently simple, regardless of the number of cases examined. It is essential to conduct a comprehensive testing process and analyze the website from scratch in order to accurately assess its integrity. This approach ensures transparency and truthfulness in the evaluation

    • @ZHENZHANG-cr1lr
      @ZHENZHANG-cr1lr 7 місяців тому +1

      Thank you for your generous sharing. There are truly no hidden aspects to this.

  • @ahmedezealdean6189
    @ahmedezealdean6189 5 місяців тому

    man you are amazing, keep up the great work.

  • @jaywandery9269
    @jaywandery9269 Рік тому

    just beginning to watch this and i can tell its going to be worth it

  • @sakibahamed3705
    @sakibahamed3705 11 місяців тому

    Thanks bro. I am just starting. These live hunting videos are really really helpful. ♥♥

  • @danmcgirr4210
    @danmcgirr4210 7 місяців тому

    You are king! Great realistic content - the best!

  • @Harshethical
    @Harshethical 2 місяці тому

    best explanation Bro!!! loved your methodology...

  • @Kheneh
    @Kheneh 2 місяці тому

    Absolutely great content ✨

  • @1ko9
    @1ko9 Рік тому

    Thank you very much for these awesome videos. Every time I watch your videos I'm learning a lot of things.

  • @YaseenKhan-s3s
    @YaseenKhan-s3s 8 місяців тому

    Love the whole video please keep teaching us

  • @mumtazkhan8324
    @mumtazkhan8324 Рік тому +2

    Great Content man, Can you please do a detailed video on XSS. Like how do you actually find it in the real life, how to start testing process, when do you stop testing, which req is most vulnerable like text/html . I have this doubt in my mind that i am not good at finding it.
    Again great content. Please keep them coming.❤

  • @yash6285
    @yash6285 Рік тому

    Thanks for bringing us these videos

  • @gamerz9129
    @gamerz9129 Рік тому

    can't wait for 2nd part amazing man alot of thanks

  • @z1ro_zb
    @z1ro_zb Рік тому

    Thanks for bringing us these videos, showing the methodology, it really helps a lot!

  • @julieuzii6350
    @julieuzii6350 9 місяців тому

    great video! thank you for the depth and explanations in this video. i think i’m finally starting to get it!

  • @nOneimportant11192a
    @nOneimportant11192a 10 місяців тому

    Thank you so much for sharing your knowledge!
    Love your videos!

  • @Iಠ_ಠl
    @Iಠ_ಠl Рік тому +1

    Thanks a LOT man 🎉🎉🎉 ❤❤❤

  • @Spiderman432
    @Spiderman432 Рік тому

    I was going to sleep it's 1:46 am then pop up came , now i can't sleep, i have to watch it cause i m obsessed with your content ❤😍

  • @kianooshmehrandish7187
    @kianooshmehrandish7187 5 місяців тому

    that was incredible, thanks for sharing, please keep up the good work legend.

  • @joeyzanna8458
    @joeyzanna8458 7 місяців тому

    Thank you sir. You are my best youtuber

  • @princeverma3867
    @princeverma3867 7 місяців тому

    Really Doing a great job 👍💪

  • @steiner254
    @steiner254 Рік тому

    Getting into IDOR's and ACV's now... nais tutorial.. cheers

  • @randriamahandryrado9800
    @randriamahandryrado9800 Рік тому

    Can't wait for part 2 😊

  • @Rubenalogia
    @Rubenalogia Рік тому

    Min 1:06:29 you missed one traffic light. You are a robot. I know it!!!! :D
    Good video bro. It is gold.

  • @leghdaf
    @leghdaf 6 місяців тому

    this video is very motivating thanks man ...

  • @TSTpodcasts
    @TSTpodcasts 5 місяців тому

    Great video. One of the best if you pay attention

  • @somebody3014
    @somebody3014 5 місяців тому

    a good program to hunt for IDORs
    It has to have authenticated testing and you have to be able to get multiple different accounts.
    taking notes is mandatory for this type of testing
    19:05 first we need to identify how the application is pulling larger data sets and identifying the user.
    1:03:48 left

  • @flobros6346
    @flobros6346 4 місяці тому

    interesting to see how others do this, thanks!

  • @iamagastya0
    @iamagastya0 7 місяців тому

    This is fantastic for beginner's

  • @mduduzithanjekwayo8404
    @mduduzithanjekwayo8404 6 місяців тому

    This is gold!

  • @MFoster392
    @MFoster392 Рік тому

    Another great video, thanks man i really enjoy your videos :-)

  • @Pem7
    @Pem7 7 місяців тому

    Good one this🤞🏾

  • @MG_1337
    @MG_1337 Рік тому +1

    Once again a great Tutorial! Thank you so much for that explanations! I'm really interested in your subdomain enumeration, maybe you could show us that in a future video :)

  • @shiftlock452
    @shiftlock452 11 місяців тому

    good Explanation 🔥🔥🔥🔥

  • @awt0x309
    @awt0x309 2 місяці тому

    Thanks man, good material, we don't have anything similar in Spanish

  • @blackbird436
    @blackbird436 10 місяців тому +2

    Good morning "Mas", thank you very much for the video.
    I am from Indonesia feel very grateful for the video, I would like to ask,
    Is there a roadmap next, for someone who has just jumped into Bug Bounty?
    The first step to understanding IDOR, maybe the next you can tell.
    Thank you "Mas".
    Greetings from me in Central Java Island, Indonesia.
    (Name is pseudonymous only)

    • @setanalaz
      @setanalaz 10 місяців тому

      Halo bang, ane juga dari jateng pekalongan wjwk

    • @blackbird436
      @blackbird436 10 місяців тому

      @@setanalaz kuliah ya?

    • @setanalaz
      @setanalaz 10 місяців тому

      @@blackbird436 no sir, still learning to jump into bug bounty from current job. belajar dmn lagi ya bang ada info kaga?

    • @blackbird436
      @blackbird436 10 місяців тому

      @@setanalaz bootcamp banyak, cuma kebanyakan make lab, jadi kurang worth it menurutku.
      Belum kalau ketemu cookie seasion dan parameter id di sembunyiin bukan tulisan id.

  • @yasharote1602
    @yasharote1602 Рік тому

    Great explanation

  • @easydosh73
    @easydosh73 Рік тому

    Love ur content! Please go for part 2!

  • @iankemboi2015
    @iankemboi2015 Рік тому

    This is so helpful. thank you

  • @MygenteTV
    @MygenteTV Місяць тому

    I think you are the first person i ever see on youtube showing real life bb. many other people just waste people time with enum and stuff like that to keep the people subbing to their channel without giving real content worth watching. in a different note, since the server was not validating the signature, why you didnt make your own token?

  • @full_automation
    @full_automation Рік тому

    very helpfull information, thank you mate

  • @gazzali7954
    @gazzali7954 7 місяців тому

    Great content

  • @Radohack
    @Radohack Рік тому

    Hi, great video, it really help us to see how you hunt for bug. Can't wait to see your live hacking video. Could be great to have a second part and see you hunt for other vulnerability.

  • @阿虎要好好生活
    @阿虎要好好生活 Рік тому

    讲的太好了

  • @edvandromauricio7353
    @edvandromauricio7353 9 місяців тому

    i have faith , that u and God will help me in this journey of bug bounty

  • @OthmanAlikhan
    @OthmanAlikhan 10 місяців тому

    Thanks for the video =)

  • @sveneFX
    @sveneFX Рік тому

    This is just great! Thanks for the live hacking, that's super useful for me.

  • @سامرسعيد-ي1ب
    @سامرسعيد-ي1ب 2 дні тому

    Very helpful thank you from iraq❤❤

  • @akashpokemonhunter7502
    @akashpokemonhunter7502 9 місяців тому +1

    Bro pls make a course for http request smuggling I want to learn this vulnerability

  • @saminbinhumayun858
    @saminbinhumayun858 Рік тому +1

    Please make a video on how to do idor testing with Autorize

  • @VelislavaKrasteva
    @VelislavaKrasteva 9 місяців тому

    Thank you for the video. Extremely useful!🤗🤩 The link to join the group in Discord is not working

  • @eduardopereira2718
    @eduardopereira2718 5 місяців тому

    Amazing Video

  • @howtocyberwar
    @howtocyberwar Рік тому

    Thank you!

  • @CyberNinja-p1t
    @CyberNinja-p1t Рік тому

    wow i finally understand how guys found bug :)

  • @AgungDimasIrawan
    @AgungDimasIrawan 3 місяці тому

    thank you..very valuable knowledge. Can you record a video of the activity when doing IDOR and it is successful then upload the video to UA-cam when the vulns has been resolved?. this must be very interesting.

  • @davdaullas3781
    @davdaullas3781 29 днів тому

    Which application do you use for taking notes?

  • @aliuzun8885
    @aliuzun8885 10 місяців тому

    Ty

  • @mtabarikasif
    @mtabarikasif Рік тому

    at 1:01:30 keeping auth token beside we can try to change the email of current account inside jwt to see if we can get the credit card of another user? can't we do that or not? somone?

  • @anusha6033
    @anusha6033 11 місяців тому +1

    bro i am not from usa, i am from india,and i tried to access the singapore website but it shows that i dont have access so I used the vpn and changed to virginia and created 2 accounts, but the burp proxy and vpn are clashing and i am not able to intercept through burp, any advice bro ?

  • @SecretLetters
    @SecretLetters Рік тому

    Go Navy beat Army

  • @maxi20zexi20
    @maxi20zexi20 6 місяців тому

    thx lord

  • @jamesdriscoll1658
    @jamesdriscoll1658 Рік тому

    Love the videos. Question for you. I am looking at starting bug hunting however, my laptop does not have the resources available to create VM's. Can VMs created in the cloud (AWS) bue used for bug hunting? thank you.

  • @eduardopereira2718
    @eduardopereira2718 5 місяців тому

    13:50 bro was definitely angry about the question

  • @sultanz1401
    @sultanz1401 Рік тому

    Hello very good video ....i just have a question how to bypass errors like the bad request that u ve got and how to when to quit digging in same mechanishm and know that there is no bug here ...thank you

    • @rs0n_live
      @rs0n_live  Рік тому +2

      Thank you!! You probably won't be able to bypass errors when you get them. The error usually means that the control is working properly. Keep in mind that IDORs are not injections, they are simply testing if the app is working how it should. You don't need to bypass anything, there is enough complexity in these applications that there always new places to test. There's no general rule to know when to stop testing, it's really about understanding the application. You need to know how the app is designed to function, then you try to make it break those rules.

  • @TheJenShow
    @TheJenShow Рік тому

    Subscribed!!!!

  • @aquatester
    @aquatester Рік тому

    nice video, keep doing

  • @mrblackhat8088
    @mrblackhat8088 Рік тому

    really helpfull

  • @netwons
    @netwons Рік тому

    When will you upload part 2?

  • @kippesolo8941
    @kippesolo8941 Рік тому

    Wouldnt it be possible to swap the payload and see at what point the change occurs? Or maybe not payload, token, idk im very new to all this.
    I mean are they valid if you just swap them or does it know that the token belongs to a different session or something?

  • @ohmsohmsohms
    @ohmsohmsohms Рік тому

    Bro I was literally just researching this

  • @هايدىفرحات-ي5ل
    @هايدىفرحات-ي5ل Рік тому

    ❤❤

  • @katmandu0
    @katmandu0 8 місяців тому

    Starting now

  • @SportSync_official
    @SportSync_official 8 місяців тому

    This mfer is a fucking legend