Real Bugs - API Information Disclosure

Поділитися
Вставка
  • Опубліковано 2 січ 2025

КОМЕНТАРІ • 78

  • @TCMSecurityAcademy
    @TCMSecurityAcademy  3 роки тому +6

    I hope you enjoyed this video! If so, please consider dropping a like and subscribing.

  • @InsiderPhD
    @InsiderPhD 4 роки тому +82

    Thank you so much for the shoutout! I'm actually working on some new API videos coming real soon including more recon techniques, understanding JSON, API hacking tools like Postman so stay tuned for even more API goodness!

  • @volatileobj3cts
    @volatileobj3cts 2 роки тому

    Total side note. This is the first time I've actually ever NEEDED the sponsor of a UA-cam video.

  • @LTT.Official
    @LTT.Official 4 роки тому +11

    Great stuff as usual Heath, just finished the Udemy course, thoroughly enjoyed it.

    • @abdulsamad-as
      @abdulsamad-as 4 роки тому

      Did you find any real world bug by using that course info???

    • @LTT.Official
      @LTT.Official 4 роки тому

      @@abdulsamad-as actually yes, it better refined my vulnerability assessment skills I undertake for work, helped me be more efficient.

    • @theintrovert894
      @theintrovert894 3 роки тому

      Can u give me thar course Plzzz❤️

    • @watchlistsclips3196
      @watchlistsclips3196 3 роки тому

      @@theintrovert894 Why can't u just buy the course.It is a gold mine actually.It should be given for 2000$ for what he is teaching.He gives u more content covering all areas.Why can't u just buy it.Just buy the course.No one going to give you this and mr.cybermentor deserve to get some support.

  • @crassProgrammer
    @crassProgrammer 4 роки тому +1

    You are taking out time to make these videos and help people like me to learn more, that's very much great. Thank you very much man and i expect many more videos.

  • @laurent9255
    @laurent9255 3 роки тому +1

    burp intruder is just a multithreaded fuzzing script that can be made in pure python . Worth the effort .

  • @virajchoksi7845
    @virajchoksi7845 4 роки тому +1

    Great! Make this your new series: ' Real bug series'. Add real world bug hunting recon streams as well if possible. Or else just some poc videos.

  • @HackinGeeK
    @HackinGeeK 3 роки тому

    Thank you man for the insiderPHD

  • @0xsunil
    @0xsunil 4 роки тому +1

    By fuzzing one can get
    GET /api-2.0/sms/
    But your blurred screenshots shows there was something more than that I mean,
    GET /api-2.0/sms/blurred-content/
    Does that mean you won't get any PII data back in response when you just hit:
    GET /api-2.0/sms/
    Just a noob here. Trying to understand. Thanks for read and/or reply.

  • @didyouknowamazingfacts2790
    @didyouknowamazingfacts2790 7 місяців тому

    That's really F'ed up that company didn't even acknowledge you or say thank you.

  • @syedz7805
    @syedz7805 4 роки тому +1

    TCM - you are really my inspiration

  • @adityapaithon6499
    @adityapaithon6499 4 роки тому +3

    Thanks dude, really informative

  • @tucanh7781
    @tucanh7781 Рік тому +1

    Thanks mentor, it's very useful!

  • @kishorebolt3065
    @kishorebolt3065 4 роки тому

    Thank you TCM I had 0 idea of api. This helped me a lot

  • @SatishSharma-gt5vo
    @SatishSharma-gt5vo 4 роки тому

    Like as always, great stuff. Thanks for all the awesome information and resources.

  • @aniketpatel8655
    @aniketpatel8655 4 роки тому +1

    Too much informative video 👍

  • @KIRIKTECH
    @KIRIKTECH 4 роки тому +2

    Informative video sir😍 tq

  • @aviralgupta9869
    @aviralgupta9869 4 роки тому +4

    Any tips if u can share to find vulnerable parameters any tool will be a great help currently I use gf pattern with gau .

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  4 роки тому +1

      Ffuf and arjun are good, but I always go back to burp

    • @aviralgupta9869
      @aviralgupta9869 4 роки тому +1

      @@TCMSecurityAcademy thnx

    • @aviralgupta9869
      @aviralgupta9869 4 роки тому

      @@TCMSecurityAcademy I came to know from various people that js files in website contains some juicy content can u tell me a kind of tool which can I used to download all js files without manualy going to burp to see individually

  • @rajipandya3574
    @rajipandya3574 4 роки тому

    You are truly The Cyber Mentor!!

  • @logmantarig
    @logmantarig 3 роки тому

    Really thanks very much, that's gonna help a lot with API enumeration

  • @parthasarathidas6217
    @parthasarathidas6217 4 роки тому

    Thanks Mentor awesome content as always 😎😎😎

  • @bobbychase5616
    @bobbychase5616 4 роки тому +2

    one on one sounds aweome!
    i need a mentor

    • @prtk4055
      @prtk4055 4 роки тому +1

      Ikr, heath would be such a great mentor to have.

    • @hilsoville1
      @hilsoville1 3 роки тому

      You'll probably find them in the CYBER space

  • @infohacking
    @infohacking 4 роки тому

    Always love you sir😊....love from India 🇮🇳🇮🇳

  • @Z0nd4
    @Z0nd4 Рік тому

    Very useful. Thanks!

  • @nadakuditigopikrishna6587
    @nadakuditigopikrishna6587 3 роки тому

    Thank you for nice content!

  • @nanocybersec1316
    @nanocybersec1316 4 роки тому

    Again man you on Fire excellent

  • @AbhishekSingh-qh9df
    @AbhishekSingh-qh9df 4 роки тому

    Can you please release a course on api pentesting or web application penetration testing

  • @RashtrwadiHarshitSanatani
    @RashtrwadiHarshitSanatani 3 роки тому

    Thank you brother ❤️

  • @krishnathakur7982
    @krishnathakur7982 4 роки тому

    Hi Heath,
    Can you create some CTF like stuff related to API testing so we can understand more deeply.

  • @joeyalfaro2323
    @joeyalfaro2323 3 роки тому

    I remember looking at hacker one bounty selection. I'm not gonna read all this so copy and pasted words to voice. Then made list ones that were paying money. Wasted bunch time learning burp suite what nightmare. I take notes get ideas what learn next. Sometimes you have submerge yourself in topic run with idea. I'm deeply involved in self sabotage. Saying nothing ever panned out why should this be any different. One guy had some great advice to himself if he was just starting find your first bug. Good recon all vulnerabilities. Part learning figuring it out yourself

  • @ahmedalsanosi5538
    @ahmedalsanosi5538 4 роки тому

    Thanks for sharing this 🙂

  • @damani9060
    @damani9060 4 роки тому

    legend as always thank you for the content.

  • @youfauchiha8531
    @youfauchiha8531 4 роки тому +3

    That T-shirt should say: Amber is my fuel 😂😂 thanks for your videos man, you're the best

  • @nareshg7292
    @nareshg7292 2 роки тому

    why did d rate limiting not kick u out while fuzzing ?

  • @tester2619
    @tester2619 4 роки тому

    so are u fuzzing the parameter of `/sms/` path?

  • @sachinbhatt4487
    @sachinbhatt4487 4 роки тому +4

    TCM♥️🔥🔥

  • @AN0NPH03N1X
    @AN0NPH03N1X 4 роки тому

    mate, after you found the sms parameter, what did you append to it next , like sms/?(it was blurred in your video) and how did you obtained that parameter after /sms/?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  4 роки тому +3

      It auto-appended stuff at the end, but it could have been an indicator of the platform, so I blurred it. The method I showed was exactly how it was found.

    • @crassProgrammer
      @crassProgrammer 4 роки тому

      @@TCMSecurityAcademy Thanks man this helped me a lot.

  • @tobypuschmann8639
    @tobypuschmann8639 4 роки тому

    Wait, you do 1:1 ?!?!?! Yes please !!!

  • @yutup509
    @yutup509 4 роки тому

    Thanks man, you are the best

  • @iqyou-gw4kd
    @iqyou-gw4kd Рік тому

    Can you give me requirements for application Android pantest

  • @akshaydeodare6149
    @akshaydeodare6149 4 роки тому

    I couldn't have maintained such calmness if that happened to me ⚡️! Cant stand bad programs tbh

  • @vishnuvardhanvanaparthi7002
    @vishnuvardhanvanaparthi7002 4 роки тому

    Great stuff

  • @MrKarn0007
    @MrKarn0007 4 роки тому

    thank you forever bro

  • @debprasadbanerjee5005
    @debprasadbanerjee5005 4 роки тому

    Damn, we don't deserve this quality content

  • @cysantosh6530
    @cysantosh6530 4 роки тому +2

    Sir after a long time...! Anyways stay safe and give knowledge that safely 😅
    .
    Support from my side always 🇮🇳🔥

  • @picanzo
    @picanzo 4 роки тому

    Wow men, what a shitty actitud from that program!! And this video... super pratical and educational.. Its good to have videos where you real situations examples. Much easier to understand!!

  • @balaamuthan6408
    @balaamuthan6408 4 роки тому

    Longtime no see

  • @V1P3R05
    @V1P3R05 4 роки тому

    How can I get a one-on-one with you?🤔🤔

    • @luismejia857
      @luismejia857 4 роки тому

      tcm-sec.com/one-on-one-tutoring/

  • @jainishpandya4246
    @jainishpandya4246 3 роки тому

    Superb

  • @theoffsecguy9406
    @theoffsecguy9406 4 роки тому +2

    Every time You Nailed with pretty much great resources ! \O/ thenksssssssssss @TheCyberMentor

  • @AmitSingh-sb5nr
    @AmitSingh-sb5nr 4 роки тому

    I am stil not able to join your discord server

  • @TheCyberExpert
    @TheCyberExpert 4 роки тому +2

    It took you so long to post a video

  • @AN0NPH03N1X
    @AN0NPH03N1X 4 роки тому +2

    You are love man

  • @saqibarif7144
    @saqibarif7144 3 роки тому

    Great

  • @StefanRows
    @StefanRows 4 роки тому

    Like + Comment ofc :)

  • @ndanilo
    @ndanilo 4 роки тому +1

    sup

  • @ca7986
    @ca7986 4 роки тому

    ❤️

  • @thanoscar7822
    @thanoscar7822 4 роки тому

    OMG no way do you like listening to Jonathan Young songs ? i would never imagine lol, anyway thanks for the video very helpful !!!

  • @dondoukhan4942
    @dondoukhan4942 4 роки тому

    👾👾👾

  • @yosoffmalik9135
    @yosoffmalik9135 4 роки тому