Загрузка...

Top 5 API Vulnerabilities That Pay in Bug Bounties

🐍 Portfolio: https://portfolio.medusa0xf.com/
✍️ Bug Bounty WriteUps: https://medusa0xf.medium.com/
--------------------------------------------------------------------------------------------------------------------------------------------
In this video, I break down the Top 5 API Vulnerabilities Every Hacker Should Look For, including BOLA (IDOR), broken authentication, excessive data exposure, missing rate limits, and common security misconfigurations. You’ll learn what each one means, how to spot them, and why they matter in real-world bug bounty hunting. Whether you’re new to API hacking or already deep in recon, this guide will help you find more impactful bugs and level up your game.

--------------------------------------------------------------------------------------------------------------------------------------------
📱 Socials:
X: https://twitter.com/medusa_0xf
Discord: https://discord.gg/SS8Eb8ejSB
LinkedIn: https://www.linkedin.com/in/insha-j-38b822225/
Instagram: https://www.instagram.com/medusa_0xf/
--------------------------------------------------------------------------------------------------------------------------------------------

Links shown in the Video:
https://hackerone.com/reports/1372216
https://hackerone.com/reports/1709881
https://owasp.org/API-Security/editions/2019/en/0xa4-lack-of-resources-and-rate-limiting/
https://medusa0xf.medium.com/how-i-discovered-a-pii-leak-in-a-developer-platform-d2f3e89653ce
https://owasp.org/API-Security/editions/2019/en/0xa5-broken-function-level-authorization/

JWT Hacking: https://www.youtube.com/playlist?list=PL4wZd4YK_64FS2peTJhrkW5EnAgJ7C3E_
API Pentesting crAPI: https://www.youtube.com/playlist?list=PL4wZd4YK_64FIm4uEPLZC4-HhFjmPBwEn
--------------------------------------------------------------------------------------------------------------------------------------------
Timestamps:

Introduction: 0:00
BOLA: 0:31
Broken Authentication: 4:04
Excessive Data Exposure: 7:31
No Rate Limiting: 9:50
BFLA: 13:50
Thoughts: 19:27
-------------------------------------------------------------------------------------------------------------------------------------------

#bugbounty #pentesting #infosec #cybersecurity #websecurity #portswigger #DOMInvader #securityresearch #ethicalhacking #vulnerability #exploit #javascript #webhacking #bugbountytips #reportwriting #zeroday #cve #idor #xss #oauth #chatgpt #owasp #owasptop10 #ssrf #recon #ethicalhacking #portswigger #owasp #bugbounty #cve #cybersecurity #graphql #apihacking #developer #hackerone #jwt #api #subdomain #portswigger #bugbounty #bola #postman #podcast #pentesting #api #hack #bola #tryhackme #hackerone

--------------------------------------------------------------------------------------------------------------------------------------------
Music from #InAudio: https://inaudio.org/
Infraction - Press Start
massobeats - rose water
massobeats - until then
massobeats - moonlit

Видео Top 5 API Vulnerabilities That Pay in Bug Bounties канала Medusa
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять