OWASP API Top 10 - Broken Authentication

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 15

  • @bertrandfossung1216
    @bertrandfossung1216 4 місяці тому +2

    Médusa you’re just the best. Your explanations of complex processes are second to none. Please keep up with this series. This is a real gem 💎

  • @abdullahjaved2371
    @abdullahjaved2371 3 місяці тому +1

    The time it'd have taken to edit this, goddamn. Keep up the content meds.

  • @IBO.ATTACKS
    @IBO.ATTACKS 3 місяці тому +1

    شكرا؟ = thanks
    🤩

  • @amoh96
    @amoh96 3 місяці тому

    i really like this type of video really cool keep it like this simple and give us examples thank u

  • @jxkz7
    @jxkz7 3 місяці тому

    Great content ❤

  • @crueljed1
    @crueljed1 3 місяці тому

    Nice explanation ❤

  • @thechannelofmine
    @thechannelofmine 3 місяці тому

    The second report is closed as informative that means it's not a valid bug. for this to be impactful the attacker has to redirect the user to his malicious page than steal those tokens using the Referer header from the victim request.

    • @Medusa0xf
      @Medusa0xf  3 місяці тому

      that's another case in itself 😄

    • @thechannelofmine
      @thechannelofmine 3 місяці тому

      @@Medusa0xf If you take a look again at the report you will see that it's closed as informative that means it's not a vulnerability, as he didn't show a real exploit senario, and it's not vulnerable to man-in-the-middle attack because it's secured as https method.
      Btw are you active on hackerone?

  • @arjuna902-
    @arjuna902- 3 місяці тому

    i love your voice