- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
Top 5 API Vulnerabilities That Pay in Bug Bounties
🐍 Portfolio: https://portfolio.medusa0xf.com/
✍️ Bug Bounty WriteUps: https://medusa0xf.medium.com/
--------------------------------------------------------------------------------------------------------------------------------------------
In this video, I break down the Top 5 API Vulnerabilities Every Hacker Should Look For, including BOLA (IDOR), broken authentication, excessive data exposure, missing rate limits, and common security misconfigurations. You’ll learn what each one means, how to spot them, and why they matter in real-world bug bounty hunting. Whether you’re new to API hacking or already deep in recon, this guide will help you find more impactful bugs and level up your game.
--------------------------------------------------------------------------------------------------------------------------------------------
📱 Socials:
X: https://twitter.com/medusa_0xf
Discord: https://discord.gg/SS8Eb8ejSB
LinkedIn: https://www.linkedin.com/in/insha-j-38b822225/
Instagram: https://www.instagram.com/medusa_0xf/
--------------------------------------------------------------------------------------------------------------------------------------------
Links shown in the Video:
https://hackerone.com/reports/1372216
https://hackerone.com/reports/1709881
https://owasp.org/API-Security/editions/2019/en/0xa4-lack-of-resources-and-rate-limiting/
https://medusa0xf.medium.com/how-i-discovered-a-pii-leak-in-a-developer-platform-d2f3e89653ce
https://owasp.org/API-Security/editions/2019/en/0xa5-broken-function-level-authorization/
JWT Hacking: https://www.youtube.com/playlist?list=PL4wZd4YK_64FS2peTJhrkW5EnAgJ7C3E_
API Pentesting crAPI: https://www.youtube.com/playlist?list=PL4wZd4YK_64FIm4uEPLZC4-HhFjmPBwEn
--------------------------------------------------------------------------------------------------------------------------------------------
Timestamps:
Introduction: 0:00
BOLA: 0:31
Broken Authentication: 4:04
Excessive Data Exposure: 7:31
No Rate Limiting: 9:50
BFLA: 13:50
Thoughts: 19:27
-------------------------------------------------------------------------------------------------------------------------------------------
#bugbounty #pentesting #infosec #cybersecurity #websecurity #portswigger #DOMInvader #securityresearch #ethicalhacking #vulnerability #exploit #javascript #webhacking #bugbountytips #reportwriting #zeroday #cve #idor #xss #oauth #chatgpt #owasp #owasptop10 #ssrf #recon #ethicalhacking #portswigger #owasp #bugbounty #cve #cybersecurity #graphql #apihacking #developer #hackerone #jwt #api #subdomain #portswigger #bugbounty #bola #postman #podcast #pentesting #api #hack #bola #tryhackme #hackerone
--------------------------------------------------------------------------------------------------------------------------------------------
Music from #InAudio: https://inaudio.org/
Infraction - Press Start
massobeats - rose water
massobeats - until then
massobeats - moonlit
Видео Top 5 API Vulnerabilities That Pay in Bug Bounties канала Medusa
✍️ Bug Bounty WriteUps: https://medusa0xf.medium.com/
--------------------------------------------------------------------------------------------------------------------------------------------
In this video, I break down the Top 5 API Vulnerabilities Every Hacker Should Look For, including BOLA (IDOR), broken authentication, excessive data exposure, missing rate limits, and common security misconfigurations. You’ll learn what each one means, how to spot them, and why they matter in real-world bug bounty hunting. Whether you’re new to API hacking or already deep in recon, this guide will help you find more impactful bugs and level up your game.
--------------------------------------------------------------------------------------------------------------------------------------------
📱 Socials:
X: https://twitter.com/medusa_0xf
Discord: https://discord.gg/SS8Eb8ejSB
LinkedIn: https://www.linkedin.com/in/insha-j-38b822225/
Instagram: https://www.instagram.com/medusa_0xf/
--------------------------------------------------------------------------------------------------------------------------------------------
Links shown in the Video:
https://hackerone.com/reports/1372216
https://hackerone.com/reports/1709881
https://owasp.org/API-Security/editions/2019/en/0xa4-lack-of-resources-and-rate-limiting/
https://medusa0xf.medium.com/how-i-discovered-a-pii-leak-in-a-developer-platform-d2f3e89653ce
https://owasp.org/API-Security/editions/2019/en/0xa5-broken-function-level-authorization/
JWT Hacking: https://www.youtube.com/playlist?list=PL4wZd4YK_64FS2peTJhrkW5EnAgJ7C3E_
API Pentesting crAPI: https://www.youtube.com/playlist?list=PL4wZd4YK_64FIm4uEPLZC4-HhFjmPBwEn
--------------------------------------------------------------------------------------------------------------------------------------------
Timestamps:
Introduction: 0:00
BOLA: 0:31
Broken Authentication: 4:04
Excessive Data Exposure: 7:31
No Rate Limiting: 9:50
BFLA: 13:50
Thoughts: 19:27
-------------------------------------------------------------------------------------------------------------------------------------------
#bugbounty #pentesting #infosec #cybersecurity #websecurity #portswigger #DOMInvader #securityresearch #ethicalhacking #vulnerability #exploit #javascript #webhacking #bugbountytips #reportwriting #zeroday #cve #idor #xss #oauth #chatgpt #owasp #owasptop10 #ssrf #recon #ethicalhacking #portswigger #owasp #bugbounty #cve #cybersecurity #graphql #apihacking #developer #hackerone #jwt #api #subdomain #portswigger #bugbounty #bola #postman #podcast #pentesting #api #hack #bola #tryhackme #hackerone
--------------------------------------------------------------------------------------------------------------------------------------------
Music from #InAudio: https://inaudio.org/
Infraction - Press Start
massobeats - rose water
massobeats - until then
massobeats - moonlit
Видео Top 5 API Vulnerabilities That Pay in Bug Bounties канала Medusa
Комментарии отсутствуют
Информация о видео
24 октября 2025 г. 18:28:07
00:19:53
Другие видео канала





















