ADVANCED BUG BOUNTY TUTORIAL: BUSINESS LOGIC VULNERABILITY | 2023

Поділитися
Вставка
  • Опубліковано 11 вер 2024
  • Note: This video is only for educational purpose.
    Intigriti: go.intigriti.c...
    Hi everyone! In this video, you will learn some best ways to stay anonymous while doing bug bounties
    Website: bepractical.tech
    Telegram: telegram.me/be...
    Previous Video: • RECON: FIND MORE BUGS ...
    The Art Of Web Reconnaissance:
    www.udemy.com/...
    Hacking Windows with Python from Scratch: www.udemy.com/...
    The Ultimate Guide to Hunt Account Takeover:
    www.udemy.com/...

КОМЕНТАРІ • 26

  • @mnageh-bo1mm
    @mnageh-bo1mm 8 місяців тому +2

    but why would the server accept the link from you ? i mean it already have it

    • @BePracticalTech
      @BePracticalTech  8 місяців тому +3

      Thanks for asking this question. Let's try to understand from the developer's perspective. Many times the file will get uploaded at the third party services(like s3 buckets etc). Suppose the user wants to re upload the file, In this case the file needs to be uploaded on the server again and the new link needs to be stored again. To speed up this process, many times developers fetch the link at the client side so that if they want to re upload the file, they can just modify the data at the client side rather than editing the data in db. Once the client is done with their file upload, they can finally click on the submit button and then the final link will be uploaded in the database. Hope you understand

    • @mnageh-bo1mm
      @mnageh-bo1mm 8 місяців тому +1

      @@BePracticalTech thx i got it even that seems untypical behavior

    • @BePracticalTech
      @BePracticalTech  8 місяців тому +2

      Glad you understand! I think every vulnerability is an untypical behavior. 😉

  • @robinhood3001
    @robinhood3001 8 місяців тому +4

    Thats awesome....pls make a tutorial on how to bypass admin wordpress panel

  • @srikanth4326
    @srikanth4326 8 місяців тому +1

    Very well explained

  • @H3xOv3rflow
    @H3xOv3rflow 8 місяців тому +2

    Thanks brother ❤

  • @oye_ahmad1657
    @oye_ahmad1657 8 місяців тому +1

    Bro make videos on how to find low hanging fruits using burpsuite🙏🏻🙏🏻🙏🏻Manual Testing....

  • @uniq6318
    @uniq6318 5 місяців тому

  • @imtiajarefin
    @imtiajarefin 8 місяців тому

    🎉🎉

  • @imran_hossain123
    @imran_hossain123 8 місяців тому

    Great bro

  • @apple_00
    @apple_00 8 місяців тому

    Thanks for you ❤

  • @orbitxyz7867
    @orbitxyz7867 8 місяців тому

    thanks bro
    Next video on cve you found

  • @joy3658
    @joy3658 8 місяців тому

    So, If I upload a malicious JPG file to the web application then the server can not validate right? like attacker using jpg to exploit or something malicious like that. (in png image cmd command)
    Then it can be a bug?
    So, in any application where uploading features going on, and server don't validating the input file then it can be a bug??

    • @joy3658
      @joy3658 8 місяців тому

      But what would be the scenerio or response like if server was validate that?

    • @BePracticalTech
      @BePracticalTech  8 місяців тому

      Please read the pinned comment to understand.

  • @whateveritis0
    @whateveritis0 8 місяців тому

    Haii, watching your videos from the Start, learned a lot., now can you do a video on, where we have to look a particular bug, for example What are the bug we can look in registration, and what are the possible parameter for particular bugs 🫶🏻

  • @r3plican
    @r3plican 8 місяців тому

    it is same as redirect vuln?

    • @BePracticalTech
      @BePracticalTech  8 місяців тому

      Yes, it is kind of similar to open redirection