$30 off During Our Annual Pro Sale. View Details »
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Hunting Bugs In Real Life
Search
akshat singhal
September 23, 2020
Technology
0
99
Hunting Bugs In Real Life
akshat singhal
September 23, 2020
Tweet
Share
Other Decks in Technology
See All in Technology
M&Aで拡大し続けるGENDAのデータ活用を促すためのDatabricks権限管理 / AEON TECH HUB #22
genda
0
230
Oracle Database@AWS:サービス概要のご紹介
oracle4engineer
PRO
1
390
Kiro を用いたペアプロのススメ
taikis
4
1.6k
日本Rubyの会: これまでとこれから
snoozer05
PRO
5
230
特別捜査官等研修会
nomizone
0
540
さくらのクラウド開発ふりかえり2025
kazeburo
2
680
AI時代のワークフロー設計〜Durable Functions / Step Functions / Strands Agents を添えて〜
yakumo
3
2k
TED_modeki_共創ラボ_20251203.pdf
iotcomjpadmin
0
140
Strands Agents × インタリーブ思考 で変わるAIエージェント設計 / Strands Agents x Interleaved Thinking AI Agents
takanorig
4
1.9k
Snowflake導入から1年、LayerXのデータ活用の現在 / One Year into Snowflake: How LayerX Uses Data Today
civitaspo
0
2.2k
『君の名は』と聞く君の名は。 / Your name, you who asks for mine.
nttcom
1
110
[Neurogica] 採用ポジション/ Recruitment Position
neurogica
1
110
Featured
See All Featured
New Earth Scene 8
popppiees
0
1.2k
Bootstrapping a Software Product
garrettdimon
PRO
307
120k
Put a Button on it: Removing Barriers to Going Fast.
kastner
60
4.1k
Utilizing Notion as your number one productivity tool
mfonobong
2
190
The untapped power of vector embeddings
frankvandijk
1
1.5k
How to train your dragon (web standard)
notwaldorf
97
6.4k
VelocityConf: Rendering Performance Case Studies
addyosmani
333
24k
Joys of Absence: A Defence of Solitary Play
codingconduct
1
260
Design of three-dimensional binary manipulators for pick-and-place task avoiding obstacles (IECON2024)
konakalab
0
310
The Cost Of JavaScript in 2023
addyosmani
55
9.4k
Why Mistakes Are the Best Teachers: Turning Failure into a Pathway for Growth
auna
0
27
Code Review Best Practice
trishagee
74
19k
Transcript
None
BUG BOUNTY WEBINAR
HUNTING BUGS IN REAL LIFE Akshat Singhal
Who am I • Bug crowd Top 700 Researcher –
All Time • Blogger • Bug Bounty Hunter • Speaker • Lifelong learner
@Akshat05623019 @akshat-singhal-90141716b @honeyakshat999 Get In Touch At @AkshatSinghal1 @AkshatSinghal @honeyakshat999
None
None
None
STORED DOM REFLECTED
None
None
SQL injection is a web security vulnerability that allows an
attacker to interfere with the queries that an application makes to its database.
▪ admin’—
None
None
TYPES HORIZONTAL VERTICAL
None
None
None
CSRF + XSS --> Account Takeover User enum.
+ IDOR --> All users compromise
None
None