Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE ✨✨
It's very difficult for to send email to an admin when you don't have his email. I tried to do a pentesting on website, I found the admin username but not his email. Is there any other solution @Rana ?
@@wolfrevokcats7890 what languages, I’m learning python steadily , recently I googled what programming languages are used by osi model do you think finding that information is any good
what's the significance of apikeys why is it a secret information? what can you do with it? and wouldn't the session key be more critical because you can steal it and impersonate a user?
api keys are usually used by developers to access paid services. leaking the api key could lead not only to private users info leak but also business financial loss
Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE ✨✨
Great work! Thanks for explaining how to solve the lab without the "Go to exploit server" functionality.
Girl your explanation is fantastic. Much love, keep going
the GOAT of explainig
I love your videos. keep up the good work. Thank you.
Thanks from Brasil, you are amazing!!
thank you madam , please make a video on information disclosure
Thanks from iraq❤
Since in the fetch method, there is not the full uri given, how does the fetch method know that it has to GET-Request the exploit server? 🤯
what if the request is using only post method? how to create the payload??
Thanks
There was never ...even once anything mentioned related to the admin account in our script...still how come the logs display the admin info??
Since its just a lab so burpsuite labs have made it in such a way that simulates a real hacking behaviour.
you are amazing ^_
It's very difficult for to send email to an admin when you don't have his email. I tried to do a pentesting on website, I found the admin username but not his email. Is there any other solution @Rana ?
Buddy this is just for information, don't actually send phishing links to admins 💀
@Rana Khalil is it necessary that i must write a script to go through i dont know how to code im trying to get started in bug bounty
bug bounty is very competitive. You should learn how to code
@@wolfrevokcats7890 what languages, I’m learning python steadily , recently I googled what programming languages are used by osi model do you think finding that information is any good
what's the significance of apikeys why is it a secret information? what can you do with it? and wouldn't the session key be more critical because you can steal it and impersonate a user?
api keys are usually used by developers to access paid services. leaking the api key could lead not only to private users info leak but also business financial loss
@@domssilva1752 where can i learn api vulnerabilities and attack?
top
لايك وانا مغمض