Bug Bounty Hunting for Server-Side Request Forgery - Who, What, When, Where, How, and Why?

  Рет қаралды 1,063

rs0n_live

rs0n_live

9 ай бұрын

As requested by ‪@abdonito8254‬!
Notes and example code: github.com/R-s0n/Bug_Bounty_N...
Questions:
WHY are you executing the attack?
WHO is the victim?
WHAT Technology are you exploiting?
WHEN will you execute the attack?
WHERE can I execute the attack?
HOW will you deliver the payload?
Follow along with my methodology here: ars0nsecurity.com/pages/metho...
Hire Me! - ars0nsecurity.com
Watch Live! - / rs0n_live
Free Tools! - github.com/R-s0n
Connect! - / harrison-richardson-ci...

Пікірлер: 26
@harshil.
@harshil. 9 ай бұрын
really enjoying this series, glad to see you uploading again.
@rs0n_live
@rs0n_live 9 ай бұрын
I'm so glad it's helpful! I had to get some ducks in a row with the methodology and framework, but there shouldn't be any major gaps in the future!
@steiner254
@steiner254 4 ай бұрын
Awesome
@abdonito8254
@abdonito8254 9 ай бұрын
Damnn 🎉 thank you so much for accept my request ❤
@rs0n_live
@rs0n_live 9 ай бұрын
No problem! I do these with my team, all the time, so they are easy to make. Hope it helps!!
@user-ck8oo1of3p
@user-ck8oo1of3p 9 ай бұрын
Aced it again brother no one explains it like you excellent thank you
@KH-en1yr
@KH-en1yr 3 ай бұрын
Authentication Vulnerabilities
@user-fk3jc4jm8s
@user-fk3jc4jm8s 9 ай бұрын
Sir you are just one of the most awesome hackers out there ❤
@rs0n_live
@rs0n_live 9 ай бұрын
Haha, thank you so much for the kind words but I promise that is not true. I actually run a Blue Team and I'm a very "Middle of the road" penetration tester, especially outside of web-based vulns. But, what I do have is a good wealth of knowledge in both Red Teaming and Blue Teaming, as well as a *very* strong foundational knowledge of the technology itself. I really think that is the key, you can't have one without the other, and you need to start with a strong understanding of the technology.
@user-fk3jc4jm8s
@user-fk3jc4jm8s 9 ай бұрын
Ofcourse Sir , you can't have one without the other@@rs0n_live
@user-fk3jc4jm8s
@user-fk3jc4jm8s 9 ай бұрын
Can you please teach us every aspect of broken authentication and session management? 😄
@rs0n_live
@rs0n_live 9 ай бұрын
I'll do my best, haha! Obviously anything under creative testing becomes very contextual to the application and specific use-case, but there are certainly a ton of general rules we can go over!
@rafbomber7151
@rafbomber7151 9 ай бұрын
I see you have some source code linked too; would you have any tips tricks or even resources on how to get better at that?
@rs0n_live
@rs0n_live 9 ай бұрын
Do you mean for finding vulnerabilities in source code, similar to the OSWE methodology or doing CVE research?
@rafbomber7151
@rafbomber7151 9 ай бұрын
@@rs0n_live finding vulnerabilities in source code is something I’m trying to get better at so if you have any insight on that would be appreciated. I don’t have much of a developer background I primarily do black box testing
@HackAll-ue3sr
@HackAll-ue3sr 8 ай бұрын
Sql Vulnerability please
@rs0n_live
@rs0n_live 8 ай бұрын
I've gotten that request a few times. That will be my next Questions Exercise question I do!
@bugbountybrigade
@bugbountybrigade 9 ай бұрын
please make it on SQLI in details please +
@rs0n_live
@rs0n_live 9 ай бұрын
Sure, that one should be easy. I think I could do one for all database injections since the should have the same answers... It's on the list! (and I'll include a practical example 😉)
@bugbountybrigade
@bugbountybrigade 9 ай бұрын
Thanks waiting for your video @@rs0n_live
@bugbountybrigade
@bugbountybrigade 9 ай бұрын
try to give it in a practical example too
@rs0n_live
@rs0n_live 8 ай бұрын
Sure, I can definitely do that! Thank you for the feedback 🙏
@bugbountybrigade
@bugbountybrigade 8 ай бұрын
looking forward for your video cheers!!@@rs0n_live
@DayanandhanSubramani
@DayanandhanSubramani 9 ай бұрын
do you have discord ???
@rs0n_live
@rs0n_live 9 ай бұрын
Not an official one yet. I'm playing around with the idea. Moderating would be tough, I'm already stretched so thin.
@DayanandhanSubramani
@DayanandhanSubramani 9 ай бұрын
@@rs0n_live and Next Twitch or youtube stream on ?
From zero to 6-digit bug bounty earnings in 1 year - Johan Carlsson - BBRD podcast #3
1:08:37
Vivaan  Tanya once again pranked Papa 🤣😇🤣
00:10
seema lamba
Рет қаралды 25 МЛН
터키아이스크림🇹🇷🍦Turkish ice cream #funny #shorts
00:26
Byungari 병아리언니
Рет қаралды 27 МЛН
Мы никогда не были так напуганы!
00:15
Аришнев
Рет қаралды 4,2 МЛН
World’s Deadliest Obstacle Course!
28:25
MrBeast
Рет қаралды 144 МЛН
Server-Side Request Forgery (SSRF) | Complete Guide
47:04
Rana Khalil
Рет қаралды 63 М.
Android App Bug Bounty Secrets
20:14
LiveOverflow
Рет қаралды 95 М.
Bypass XSS WAF to trigger XSS - Bug Bounty PoC - Professor the Hunter
4:40
Professor the Hunter
Рет қаралды 1,1 М.
Server-Side Request Forgery (SSRF) Explained
15:58
NahamSec
Рет қаралды 23 М.
Find and Exploit Server-Side Request Forgery (SSRF)
8:56
The Cyber Mentor
Рет қаралды 36 М.
Do you REALLY need SSR?
18:15
Theo - t3․gg
Рет қаралды 161 М.
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
19:58
Bug Bounty Reports Explained
Рет қаралды 14 М.
Vivaan  Tanya once again pranked Papa 🤣😇🤣
00:10
seema lamba
Рет қаралды 25 МЛН