Link
Embed
Share
Beginning
This slide
Copy link URL
Copy link URL
Copy iframe embed code
Copy iframe embed code
Copy javascript embed code
Copy javascript embed code
Share
Tweet
Share
Tweet
Slide 1
Slide 1 text
No content
Slide 2
Slide 2 text
BUG BOUNTY WEBINAR
Slide 3
Slide 3 text
HUNTING BUGS IN REAL LIFE Akshat Singhal
Slide 4
Slide 4 text
Who am I • Bug crowd Top 700 Researcher – All Time • Blogger • Bug Bounty Hunter • Speaker • Lifelong learner
Slide 5
Slide 5 text
@Akshat05623019 @akshat-singhal-90141716b @honeyakshat999 Get In Touch At @AkshatSinghal1 @AkshatSinghal @honeyakshat999
Slide 6
Slide 6 text
No content
Slide 7
Slide 7 text
No content
Slide 8
Slide 8 text
No content
Slide 9
Slide 9 text
STORED DOM REFLECTED
Slide 10
Slide 10 text
No content
Slide 11
Slide 11 text
No content
Slide 12
Slide 12 text
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.
Slide 13
Slide 13 text
▪ admin’—
Slide 14
Slide 14 text
No content
Slide 15
Slide 15 text
No content
Slide 16
Slide 16 text
TYPES HORIZONTAL VERTICAL
Slide 17
Slide 17 text
No content
Slide 18
Slide 18 text
No content
Slide 19
Slide 19 text
No content
Slide 20
Slide 20 text
CSRF + XSS --> Account Takeover User enum. + IDOR --> All users compromise
Slide 21
Slide 21 text
No content
Slide 22
Slide 22 text
Slide 23
Slide 23 text
No content