Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Hunting Bugs In Real Life
Search
akshat singhal
September 23, 2020
Technology
0
89
Hunting Bugs In Real Life
akshat singhal
September 23, 2020
Tweet
Share
Other Decks in Technology
See All in Technology
あなたの人生も変わるかも?AWS認定2つで始まったウソみたいな話
iwamot
3
860
生成AIのビジネス活用
seosoft
0
110
Visual StudioとかIDE関連小ネタ話
kosmosebi
1
380
re:Invent 2024のふりかえり
beli68
0
110
Amazon Route 53, 待ちに待った TLSAレコードのサポート開始
kenichinakamura
0
170
完全自律型AIエージェントとAgentic Workflow〜ワークフロー構築という現実解
pharma_x_tech
0
350
TSのコードをRustで書き直した話
askua
2
190
Godot Engineについて調べてみた
unsoluble_sugar
0
410
Amazon Q Developerで.NET Frameworkプロジェクトをモダナイズしてみた
kenichirokimura
1
200
Git scrapingで始める継続的なデータ追跡 / Git Scraping
ohbarye
5
500
WantedlyでのKotlin Multiplatformの導入と課題 / Kotlin Multiplatform Implementation and Challenges at Wantedly
kubode
0
250
KMP with Crashlytics
sansantech
PRO
0
240
Featured
See All Featured
Raft: Consensus for Rubyists
vanstee
137
6.7k
Docker and Python
trallard
43
3.2k
Build The Right Thing And Hit Your Dates
maggiecrowley
33
2.5k
RailsConf 2023
tenderlove
29
970
Adopting Sorbet at Scale
ufuk
74
9.2k
Performance Is Good for Brains [We Love Speed 2024]
tammyeverts
7
570
The Language of Interfaces
destraynor
155
24k
Navigating Team Friction
lara
183
15k
Agile that works and the tools we love
rasmusluckow
328
21k
[RailsConf 2023 Opening Keynote] The Magic of Rails
eileencodes
28
9.2k
Improving Core Web Vitals using Speculation Rules API
sergeychernyshev
3
180
A Modern Web Designer's Workflow
chriscoyier
693
190k
Transcript
None
BUG BOUNTY WEBINAR
HUNTING BUGS IN REAL LIFE Akshat Singhal
Who am I • Bug crowd Top 700 Researcher –
All Time • Blogger • Bug Bounty Hunter • Speaker • Lifelong learner
@Akshat05623019 @akshat-singhal-90141716b @honeyakshat999 Get In Touch At @AkshatSinghal1 @AkshatSinghal @honeyakshat999
None
None
None
STORED DOM REFLECTED
None
None
SQL injection is a web security vulnerability that allows an
attacker to interfere with the queries that an application makes to its database.
▪ admin’—
None
None
TYPES HORIZONTAL VERTICAL
None
None
None
CSRF + XSS --> Account Takeover User enum.
+ IDOR --> All users compromise
None
None