Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Hunting Bugs In Real Life
Search
akshat singhal
September 23, 2020
Technology
0
100
Hunting Bugs In Real Life
akshat singhal
September 23, 2020
Tweet
Share
Other Decks in Technology
See All in Technology
小さく始めるBCP ― 多プロダクト環境で始める最初の一歩
kekke_n
1
320
会社紹介資料 / Sansan Company Profile
sansan33
PRO
15
400k
仕様書駆動AI開発の実践: Issue→Skill→PRテンプレで 再現性を作る
knishioka
2
560
AIと新時代を切り拓く。これからのSREとメルカリIBISの挑戦
0gm
0
680
CDKで始めるTypeScript開発のススメ
tsukuboshi
1
300
Bill One 開発エンジニア 紹介資料
sansan33
PRO
4
17k
~Everything as Codeを諦めない~ 後からCDK
mu7889yoon
3
250
GCASアップデート(202510-202601)
techniczna
0
250
GSIが複数キー対応したことで、俺達はいったい何が嬉しいのか?
smt7174
3
130
All About Sansan – for New Global Engineers
sansan33
PRO
1
1.3k
ClickHouseはどのように大規模データを活用したAIエージェントを全社展開しているのか
mikimatsumoto
0
180
Databricks Free Edition講座 データサイエンス編
taka_aki
0
290
Featured
See All Featured
A Tale of Four Properties
chriscoyier
162
24k
Digital Projects Gone Horribly Wrong (And the UX Pros Who Still Save the Day) - Dean Schuster
uxyall
0
290
Building Adaptive Systems
keathley
44
2.9k
AI Search: Where Are We & What Can We Do About It?
aleyda
0
6.9k
Marketing to machines
jonoalderson
1
4.6k
Ten Tips & Tricks for a 🌱 transition
stuffmc
0
63
How STYLIGHT went responsive
nonsquared
100
6k
AI in Enterprises - Java and Open Source to the Rescue
ivargrimstad
0
1.1k
Reality Check: Gamification 10 Years Later
codingconduct
0
2k
Designing for Performance
lara
610
70k
Into the Great Unknown - MozCon
thekraken
40
2.2k
Rebuilding a faster, lazier Slack
samanthasiow
85
9.4k
Transcript
None
BUG BOUNTY WEBINAR
HUNTING BUGS IN REAL LIFE Akshat Singhal
Who am I • Bug crowd Top 700 Researcher –
All Time • Blogger • Bug Bounty Hunter • Speaker • Lifelong learner
@Akshat05623019 @akshat-singhal-90141716b @honeyakshat999 Get In Touch At @AkshatSinghal1 @AkshatSinghal @honeyakshat999
None
None
None
STORED DOM REFLECTED
None
None
SQL injection is a web security vulnerability that allows an
attacker to interfere with the queries that an application makes to its database.
▪ admin’—
None
None
TYPES HORIZONTAL VERTICAL
None
None
None
CSRF + XSS --> Account Takeover User enum.
+ IDOR --> All users compromise
None
None