HACKING GraphQL FOR BEGINNERS + GIVEAWAY (closed)

  Рет қаралды 35,800

Farah Hawa

Farah Hawa

Күн бұрын

I'm a bug bounty hunter who's learning everyday and sharing useful resources as I move along. Subscribe to my channel because I'll be sharing my knowledge in new videos regularly.
BUY ME A COFFEE:
www.buymeacoffee.com/farahhawa
Connect with me on LinkedIn: / farah-hawa-a012b8162
Follow me on Twitter: / farah_hawaa
Follow me on Instagram: / farah_hawaa
GIVEAWAY WINNERS: AVIRAL OFFICIAL , Mohammed Kaif and prin devil
GRAPHQL LAB:
github.com/david3107/graphql-...
BURP EXTENSION: InQL Scanner
portswigger.net/bappstore/296...
RESOURCES FOR GRAPHQL:
graphql.org/learn/
hasura.io/learn/graphql/intro...
/ introspection-in-graphql
www.howtographql.com/graphql-...
Video editor: www.fiverr.com/pixelstudios1

Пікірлер: 319
@FarahHawa
@FarahHawa 4 жыл бұрын
Comment and let me know your favourite bug bounty tip as well as your own Twitter handle! The giveaway closes on 22nd July 2020. :)
@cyberpirate007
@cyberpirate007 4 жыл бұрын
You made comment section a blog post. .......
@FarahHawa
@FarahHawa 4 жыл бұрын
Cyber Pirate 😇😇
@roger5968
@roger5968 4 жыл бұрын
want to know step by step procedure to start with bugcrowd and what are the known issue mentioned in program, should we ignore thore vulnerabilities. basically want to see bugcrowd and start attack on any program. doesn't matter if you find vulnerability or not.
@aviralgupta9869
@aviralgupta9869 4 жыл бұрын
@@cyberpirate007 hey dude what r u doing here 😂😂
@cyberpirate007
@cyberpirate007 4 жыл бұрын
@@aviralgupta9869 Hey I think i know this guy......🤔🤔
@kiranakula8428
@kiranakula8428 4 жыл бұрын
Hi, I’m just newbie to this bug hunting and I’m doing lot recon and googling to understand the web apps. Your videos are lot of informative. Bravo!
@d0pameen982
@d0pameen982 4 жыл бұрын
Feel proud to see your efforts so far! All the best Farah!
@digitaldina
@digitaldina 4 жыл бұрын
I just got started hacking graphql and this is so helpful thanks Farah! Keep up the awesome work ❤️
@CarmelleCodes
@CarmelleCodes 4 жыл бұрын
i feel like i learned more from this video than an entire day of graphql documentation reading lol thank you so much for uploading this!
@trieulieuf9
@trieulieuf9 2 жыл бұрын
Yes, documentation is often overrated. They are good in case we want to find specific details though.
@nowonder9466
@nowonder9466 3 жыл бұрын
This video was very helpful. I just came across an application today that utilized graphql and I had no idea where to begin testing it. And then I found you're channel while surfing youtube looking for some anime to watch later in the day. Imagine that! Lol Great stuff. Thanks.
@novanar9629
@novanar9629 3 жыл бұрын
I learned a lot from this video, thank you Farah
@udohellz4340
@udohellz4340 2 жыл бұрын
Very informative...I needed this . Short and to the point
@nishanths9652
@nishanths9652 3 жыл бұрын
Awesome.... I literally stunned... In the end of the video I just click the subscribe button... ❤️
@jasonybarra8277
@jasonybarra8277 3 жыл бұрын
Farah awesome video this seems like SQL coding with some kind of web based manipulation. I'm new to the bug bounty game but some of the things your teaching are familiar to me. Again great video keep it up
@TanishqAnand
@TanishqAnand 4 жыл бұрын
Hey, Thanks for explaining the things in easiest way possible. :)
@unixerius6632
@unixerius6632 6 ай бұрын
Thank you very much for your fast and very clear explanation of these types of attacks! I really appreciate the effort you put into this video.
@pernikaamadan9354
@pernikaamadan9354 4 жыл бұрын
Amazing Farah!!! 🌸💕💕💕
@letsdigin2155
@letsdigin2155 4 жыл бұрын
I didn't came to the comment section for the giveaway... my guess was right.. every comment is worth reading. I got so much useful stuffs from here...there was 195 comment when i wrote this.... I don't have any great tips as others have... Happy hacking, Happy learning... that's it..
@jishnujha2007
@jishnujha2007 3 жыл бұрын
Cutest pentester ever .... good job Farah! Keep it up !
@vis2079
@vis2079 4 жыл бұрын
That was a quick video giving quite a good insight on GraphQL. Thanks Farah, About the Tip: No point in just watching or reading thru hacktivity / blog, One has to step into action on Bugbounty (Open browser and start cracking) ;)
@gabrielraulkumar8656
@gabrielraulkumar8656 4 жыл бұрын
2nd Comment! This video is awesome!
@pranavgadekar8641
@pranavgadekar8641 4 жыл бұрын
We asked and you heard. Thank you for the video. That was amazingly explained. 🙌 There are few things that I learnt over the time while doing the bug bounty hunting: 1. Recon is one of the most important steps while understanding the application. There are many parts of the application that people forget to look for and those things can cause pretty serious damage to the organization if not found and reported. So, always do the recon first and do it effectively. As Abraham Lincoln famously quoted, “If I had eight hours to chop down a tree, I'd spend six sharpening my axe.” 2. Always write crisp and clear reports. I cannot stress this enough. Always write the reports that are easy to understand and can provide a good learning experience to everyone reading that report. We all learn from each other. @PranavGadekar9
@faysalahmed7251
@faysalahmed7251 4 жыл бұрын
U r doing great sis. Keep it up. Love frm Bangladesh
@pakflutterdeveloper
@pakflutterdeveloper 4 жыл бұрын
Very useful video, thanks, We are waiting for your next video
@sharghaas7774
@sharghaas7774 4 жыл бұрын
My Fav tip:"Before you ask anyone any questions, make sure you've looked it up and then go back when you've done research but got stuck on actual hard problems" I learned that in my hackerspace, it was hard at first because there was so much to look up but I wouldn't have become who I am without it. Love your stuff Farah, for some reason the music was shifting my concentration from your voice and explanations but that GrpahQL was really good. I'll need to watch it a couple of times will doing a lab to really get the feel of it but it's really good. @GGTioNogu
@abhhibirdawade9657
@abhhibirdawade9657 4 жыл бұрын
Regardless of video and content, which is awesome anyway, the comments below are so awesome as all bug hunter gave their tips to stay motivated. I think this is the best ninjaTecinque to help other hunters. Kudos to you guys..
@shelldreddTV
@shelldreddTV 3 жыл бұрын
Good content, thanks for share with the community.
@mersalmakers1577
@mersalmakers1577 3 жыл бұрын
Hi fara really useful video... 😉
@hamzadhaider1997
@hamzadhaider1997 4 жыл бұрын
Well the tip i would give is recon as much as possible and also look for endpoints in javascript as they are more vulnerable then endpoints defined in webpages. Also do look for bussiness logical bugs as they cannot be technically be patched easily. Don't have twitter btw lol 😅
@Cdaprod
@Cdaprod Жыл бұрын
Great job! 🎉
@kuldipzalavadiya9971
@kuldipzalavadiya9971 4 жыл бұрын
1. Recon is very important so that extract all possible information about our target. 2.always try to find vulnerability on a subdomain because big scope to find vuln on a subdomain. 3. Properly read the policy of the program. 4. Keep patience. 5. Always ready to face failures but don't lose your confidence. 5. Don't rely on automation expect(proxy, subdomain finder), always try the manual testing. 6. Not focus on money just focus on learning. 7. Once the bug is found then make a clever report and make by your self don't copy on the google.
@user-ev6fj4bt7x
@user-ev6fj4bt7x 3 жыл бұрын
You gave me a free 500 points on CTF, thank you!
@Nothing-lh9hp
@Nothing-lh9hp 4 жыл бұрын
great job farah
@pauraspatil9314
@pauraspatil9314 3 жыл бұрын
Nicely explained!!
@swapnilpawar2311
@swapnilpawar2311 4 жыл бұрын
My Tip is, give equal time to every vulnerability in your program. You don't know what you gonna find
@MohsinAli-td1sw
@MohsinAli-td1sw 4 жыл бұрын
Nice Explanation. Ma'am can you please make videos, in which we can see working POC of different vulnerabilities.
@Malware01
@Malware01 4 жыл бұрын
My Tip for Bug bounty 1.Don't run for Burpsuite pro, community edition is also good. (chrome tools aswell) 2. In case you feel VM is heavy for your system use docker (make sure save your data before exiting docker). kali is also available in docker and many other images available. 3.Running out of memory because of burp add "-Xmx2g" i.e "java -jar -Xmx2g" (2g is memory allocated to burp). 4.Give more time to your learning 5.Place to inject payloads Cookie,host header,Referal header. 6.Invest in your self 7.Keep yourself mently and physical fit. Twitter handle @mt_ins
@kathanmehtaa
@kathanmehtaa 4 жыл бұрын
Hello farah , kali linux or ubuntu ,which os should I use and which type of security tools you use to protect your self from getting cought ?
@DrawingWithNoobArtist
@DrawingWithNoobArtist 4 жыл бұрын
Always focus the target as it’s a fresh one
@srplayzz1
@srplayzz1 7 ай бұрын
I found a introspection vulnerability in a website now should i exploit more or that much is enough
@newlife5775
@newlife5775 4 жыл бұрын
I am liking your content, you should try to make the videos on more frequently.
@rohitgupta-es4fd
@rohitgupta-es4fd 4 жыл бұрын
my fav bug bounty tip is: review source code as much you can this can leads sometime advanced exploitation such as : RCE through insecure desirialization :)
@rohitgupta-es4fd
@rohitgupta-es4fd 4 жыл бұрын
@hackR i know that buddy if i have to copy and paste i would pasted some good tip...this is my own tip
@rohitgupta-es4fd
@rohitgupta-es4fd 4 жыл бұрын
@hackR bany begineer skips to review source code beacause it is frustating..but if u reviwed it patiently you can get some good stuff
@coder_rc
@coder_rc 4 жыл бұрын
Awesome 🤩
@carlosmonterrosa4617
@carlosmonterrosa4617 4 жыл бұрын
Nice video! Keep it up!
@beautyofindia6137
@beautyofindia6137 4 жыл бұрын
jazakallah khairun keep it up
@akashsharma143
@akashsharma143 4 жыл бұрын
I am just starting learning about web applications can you recommend me any good book for learning web application architecture and the technologies used. Up untill now i have been reading web application hacker's handbook and searching about the terms on youtube or on google. Do you think it is good way to learn it?
@born2program486
@born2program486 4 жыл бұрын
in short GraphQL is a query language for your API, and a server-side runtime for executing queries by using a type system you define for your data
@zaptrix_xian8393
@zaptrix_xian8393 4 жыл бұрын
My favorite tip from this video was how you used InQL, I had been previously hacking on a graphQL target without using that and it helps so much now. @JoelMonteres
@prindevil5576
@prindevil5576 4 жыл бұрын
My tip : use shodan extension so you can easily find ip , host , port, services running on , 2. If you wanna use GitHub, gitlab tools without downloading in your system usr gitpod.io it's really fast give it a try . 3. Must use container extension so you don't need many browser ,.
@prindevil5576
@prindevil5576 4 жыл бұрын
Oh my Twitter handle is @fuxksniper , thanks for video
@animeloverpakbj8229
@animeloverpakbj8229 3 жыл бұрын
She was looking so cute in the thumbnail... ❤️❤️❤️❤️
@ujjwal_4640
@ujjwal_4640 4 жыл бұрын
My favorite BB tip is: Go through the application manually and try to know how it works and how its supposed to function, this may help in two ways: 1. You might find a logic flaw and report it or maybe you can exploit it to get a greater hold of the application. 2. You may prevent the clause of "Its the intended functionality". Twitter-handle: @ujjwaltyagi355 Well, I am learning web application testing, so a pentester lab subscription will be really helpful for me. Thank you.
@MRMRCEE75
@MRMRCEE75 Жыл бұрын
Awesome video
@shivangtrivedi1139
@shivangtrivedi1139 4 жыл бұрын
@Cipher_942 Use shodan for looking out of vulnerable IP's of the target to smbv3 (RCE)
@sumankunwar865
@sumankunwar865 4 жыл бұрын
awesome vedio... thank you for your contribution....:)
@sumankunwar865
@sumankunwar865 4 жыл бұрын
favourite bug bounty tip is information gathering and recon
@davemahadev899
@davemahadev899 4 жыл бұрын
Keep target in mind and work for it and search everything and always have latest information in IT @phoenix
@spyboyblog
@spyboyblog 4 жыл бұрын
keep it up.
@oldAyushShuklaYouTube
@oldAyushShuklaYouTube 2 жыл бұрын
so pretty (explaination)
@mihirwalia8213
@mihirwalia8213 4 жыл бұрын
New to bug bounty so haven't found much... I have learnt about IDORs and csrf attacks which are pretty interesting... thanks for the videos and help❤️ and if i am lucky then contact me through linkedin(we had a chat recently)
@boneytech3965
@boneytech3965 4 жыл бұрын
Help full thanks
@gabrielraulkumar8656
@gabrielraulkumar8656 4 жыл бұрын
1st like is me!
@herisonfreesome1146
@herisonfreesome1146 4 жыл бұрын
Thank you
@sabujmaity5427
@sabujmaity5427 4 жыл бұрын
Pickup One Vulnerability and put rigorous amount of effort and not to take the report lightly because it's one of the major component ! Thanks @SabujMaity9
@deathmakesmoresense5354
@deathmakesmoresense5354 4 жыл бұрын
Automate everything, apply all concepts recursively, do things that nobody else is, research, be persistent, macro recon, micro focus, read bug reports, community learning, collaboration, keep it fun, don't sacrifice wellbeing! Good luck! Grinning face with smiling eyes What do you mean by Automate everything take this example: Suppose we have like 600k URLs , then what bugs can we look for if we go breadth wise and how? Write bash script to Send standard headers along with 'Origin' in every request. git folder common resources e.g. .git info from headers e.g. Jenkins instance, bad CORS page classification e.g. if 'type="password"' in response: login page elseif response == '': blank page subdomain takeover One of the best secret for finding bugs is to never assume anything i feel 100 people can look same features on that application and they will go na sure that is not vulnerable and the 101 people will find the bug. Loook at this article below , he did what 100 people didn't actually missed out to do blog.dewhurstsecurity.com/2014/12/09/how-i-hacked-facebook.html
@SkylineGeek
@SkylineGeek 4 жыл бұрын
Stick to one specific BB program or stick to one specific attack type. Whenever you find userid or any such id, send that request to repeater nd try modifying the ids #EasyIDOR @skylinegeek
@jamesjacob573
@jamesjacob573 4 жыл бұрын
You smart, girl
@justwaterweight
@justwaterweight 4 жыл бұрын
🤩❤️😇
@aneeshnadh5377
@aneeshnadh5377 4 жыл бұрын
My tip is that donot look for bugs where everyone is looking, think and find a place where no one had looked for
@darshanvasu9933
@darshanvasu9933 4 жыл бұрын
Have a insight of the place where you are planning to attack and dig as much as possible..
@lakshyakumar7583
@lakshyakumar7583 4 жыл бұрын
"Persistence is very important. You should not give up unless you are forced to give up" - Elon Musk @p0i5on8
@smartcomputring1034
@smartcomputring1034 4 жыл бұрын
didi apne english me bola kush samaj me aya kush nahi magar ap ki awaj kitani ashi he hy raba ap kitani sundar ho didi mene hacking shikhana habi suru kiya he me class9 me hu magar suru kase karu is par ak video banado didi
@aravindvv2276
@aravindvv2276 4 жыл бұрын
got a doubt how u got ur localhost in 0.0.0.0
@arshiyakhan6789
@arshiyakhan6789 4 жыл бұрын
Can someone tell me how much coding I do need to be good at bug bounty, because I don't know even a,b,c of coding.
@bbkevines
@bbkevines 4 жыл бұрын
In this field you can manage without knowledge of coding, but if you can read code it helps a lot..
@lapuranjan5574
@lapuranjan5574 3 жыл бұрын
💘 I love ❤
@hackncrack279
@hackncrack279 4 жыл бұрын
You are Good 👍😘
@jasonybarra8277
@jasonybarra8277 3 жыл бұрын
I'm not sure if you already did but I think you'd be a great guest via zoom on Paul Security Weekly 😁👍🌞🖖
@rajeshkumawat3999
@rajeshkumawat3999 4 жыл бұрын
For Subdomain Takeover always look for CMS as well and not only CNAME. Recently i saw that CMS was netlify but CNAME was not there so i went ahead to takeover and it was successfull. Just you have to upload .html on github account because it takes input from github and that's it. @rajesh1kumawat
@gk_eth
@gk_eth 4 жыл бұрын
Please make a video on RESTful APIs, that would be helpful :)
@0xsunil
@0xsunil 4 жыл бұрын
A suggestion: Can you please keep the mouse pointer visible? It'd help us follow along. Otherwise, viewers might miss things if you clicked some button they weren't looking at. My Bug Bounty Tip: Follow Farah Hawa' YT channel. haha kidding. My tip would be, to explore every single functionality and end point like a normal user before attacking. Read every single request, every single response. You never know a redirect page's response might give you something interesting. The more you know about your target, the more you will find bugs. The time spend understanding the target really pays off.
@anirudhkaushal3009
@anirudhkaushal3009 4 жыл бұрын
First of all, thank you for the video. One question that I have for you is, the inQL scanner you are using, is it only used for converting the GraphQL query into a more readable format or does it provides some other functionalities as well?
@FarahHawa
@FarahHawa 4 жыл бұрын
It generates some queries for us by automating Introspection. It's not as effective as manually doing it imo, but still pretty helpful.
@anirudhkaushal3009
@anirudhkaushal3009 4 жыл бұрын
Thanks for the info.
@sahanaprasad4607
@sahanaprasad4607 3 жыл бұрын
can you please do this kind of video for grpc services?
@anubhavsingh4965
@anubhavsingh4965 4 жыл бұрын
Don’t feel your starting late.its never late to do anything @AnubhavSingh_
@jameskolleh8195
@jameskolleh8195 4 жыл бұрын
Good video
@dxdarrel8843
@dxdarrel8843 3 жыл бұрын
The music makes it feel like I am watching Khana Khazana but for Hacking lol
@MdSajid-fb9ul
@MdSajid-fb9ul 4 жыл бұрын
Firstly start exploring the application without jumping to the pen testing tool ofcourse u can make use of browser dev tools. Always look at the path less travelled but sometimes u may find something in the normal path(frequently travelled) as an example Whatsapp bug discovered in 2019 which allowed the receiver to upgrade it to a video call without the knowledge of the individual making the voice call. It was a serious security issue. The reporter was an engineer graduate and made in to the Facebook Hall of Fame 2019. Twitter handle: @I_m_Saj
@gautamk381
@gautamk381 3 жыл бұрын
would you like to tell us that what are your qualifications?
@KIRIKTECH
@KIRIKTECH 4 жыл бұрын
Recon properly because it tells you where exactly you need to hunt for bug @keerthik_krs
@Recklezz28
@Recklezz28 4 жыл бұрын
Follow disclosure reports on your preferred platform and what you can apply to your targets and programs. @RecklezzPenguin Thanks for another great video Farah!
@jasonybarra8277
@jasonybarra8277 3 жыл бұрын
Funny short story I did MySQL coding assignments on an LG optimus screen🤣😆 which riding in a work truck on an icy Michigan road 😆🤣
@Shivamashish5236
@Shivamashish5236 2 жыл бұрын
So you also tech hacking,ceber security course?
@KumarAshwinSpark
@KumarAshwinSpark 4 жыл бұрын
Know how the application works and basic workflow of it before diving into attack mode. @OkAshwin The video was really informative, thanks!!
@bibekdhakal5353
@bibekdhakal5353 4 жыл бұрын
Bug bounty is all about gaining and sharing. I would like to thank all the people who have contributed their knowledge and made this easier. :) “When you move your focus from competition to contribution life becomes a celebration. Never try to defeat people, just win their hearts.” --Buddha @kira_dhakal
@srikanthreddyduggempudi8245
@srikanthreddyduggempudi8245 4 жыл бұрын
Using OSINT skills to find sensitive data @_Alphagens
@akhileshp3523
@akhileshp3523 4 жыл бұрын
As a beginner where I have to start
@roger5968
@roger5968 4 жыл бұрын
Hi Farha, those are new like me, dont know how to use github repository, could you please make a video to show how to setup lab with github repository.
@FarahHawa
@FarahHawa 4 жыл бұрын
KING乡Akii you’ll find instructions to set it up on the github repository, it’s different for every lab.
@bluefox115
@bluefox115 4 жыл бұрын
Here's a tip, dont be afraid to ask for help from the community
@gabrielraulkumar8656
@gabrielraulkumar8656 4 жыл бұрын
I also want to become a bug bounty hunter, Ma'am. Plz help me!
@feynman8692
@feynman8692 4 жыл бұрын
if you find a vulnerability ... don't stop at that ... try to find more ! @vibhummusic
@muhammadaliakbar4189
@muhammadaliakbar4189 4 жыл бұрын
Enumeration is the key :) @H0j3n
@hardeekpatel9112
@hardeekpatel9112 4 жыл бұрын
Start from basic. Go step by step. Don't loose hope. Keep trying. @Hardeek_Patel
@vivekkamble3239
@vivekkamble3239 4 жыл бұрын
Be hungry for knowledge, give back to the community, don’t be afraid to fail, and enjoy the ride... @_vivekkamble_
@jakianam9554
@jakianam9554 4 жыл бұрын
Will email work? FOR giveaway
@kuldeepsingh2983
@kuldeepsingh2983 4 жыл бұрын
music is little high. can u reduce volume of music in next video.(just a little bit). even this lvl is not a problem at all, however here i have to put little effort to isolate your voice and concentrate on that rather than music.
@kuldeepsingh2983
@kuldeepsingh2983 4 жыл бұрын
and please don't consider this comment for giveaway as i am a complete noobie and there is no way i will be able to make use of give-away.
@brahimchebli7781
@brahimchebli7781 4 жыл бұрын
My bug bounty tip is : recon recon recon , recon always win
@arunnair8915
@arunnair8915 4 жыл бұрын
Bug Bounty Tip: "Try try try but don't cry".
@bot-hk
@bot-hk 4 жыл бұрын
Since i am a beginner I can't help much, but I am suggested to use burpsuite as a tool for searching bugs. @prorajnikant
BYPASSING SAML AUTHENTICATION FOR BEGINNERS!
8:24
Farah Hawa
Рет қаралды 28 М.
HACKING OAuth 2.0 FOR BEGINNERS!
10:26
Farah Hawa
Рет қаралды 43 М.
ПРОВЕРИЛ АРБУЗЫ #shorts
00:34
Паша Осадчий
Рет қаралды 7 МЛН
Red❤️+Green💚=
00:38
ISSEI / いっせい
Рет қаралды 85 МЛН
A teacher captured the cutest moment at the nursery #shorts
00:33
Fabiosa Stories
Рет қаралды 47 МЛН
#NahamCon2024: GraphQL is the New PHP | @0xlupin
26:17
NahamSec
Рет қаралды 6 М.
Next Gen Hackers protecting our world
57:39
David Bombal
Рет қаралды 117 М.
Hunting for bugs in GraphQL APIs (Demo)
50:41
InsiderPhD
Рет қаралды 15 М.
Finding Your Next Bug: GraphQL
49:34
InsiderPhD
Рет қаралды 23 М.
HACKING postMessage() FOR BEGINNERS!
8:57
Farah Hawa
Рет қаралды 33 М.
Real Bugs - API Information Disclosure
17:32
The Cyber Mentor
Рет қаралды 33 М.
GraphQL Injection | basics of GraphQL for Pentesters
35:59
NeXuS InfoSec
Рет қаралды 99
Regular Expression DOS FOR BEGINNERS!
9:15
Farah Hawa
Рет қаралды 11 М.
Transport Layer Security (TLS) - Computerphile
15:33
Computerphile
Рет қаралды 473 М.
ПРОВЕРИЛ АРБУЗЫ #shorts
00:34
Паша Осадчий
Рет қаралды 7 МЛН