- Видео 59
- Просмотров 342 204
Abhishek Morla
Индия
Добавлен 27 авг 2017
Ethical Bug Bounty Reports POC || Labs Tutorial
For the removal of the video DM at www.linkedin.com/in/abhishekmorla
Disclaimer: Elevate your cybersecurity skills! 🛡️ Explore recreated Proofs of Concept (PoCs) created on my own system to enhance understanding of ethical hacking techniques. Unravel the complexities with me and stay ahead in the bug bounty game! This content is solely for educational purposes, based mostly on open-source programs or PoCs of already fixed vulnerabilities. No exploitations or data breaches are conducted for the PoCs on this channel. Always obtain proper authorization before performing any bug bounty testing.
For the removal of the video DM at www.linkedin.com/in/abhishekmorla
Disclaimer: Elevate your cybersecurity skills! 🛡️ Explore recreated Proofs of Concept (PoCs) created on my own system to enhance understanding of ethical hacking techniques. Unravel the complexities with me and stay ahead in the bug bounty game! This content is solely for educational purposes, based mostly on open-source programs or PoCs of already fixed vulnerabilities. No exploitations or data breaches are conducted for the PoCs on this channel. Always obtain proper authorization before performing any bug bounty testing.
$2500 Bounty | remote code execution Bug Bounty POC | Bug Bounty Program 2025 | command injection
Remote code execution due to the insecure use of the eval function
------------------------------------------------------------------------
Join this channel to get access to the perks:
ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin
------------------------------------------------------------------------
#bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution
#fileuploadvulnerability
#bugbounty
#ethicalhacking
#websecurity
#cybersecurity
#poc
#vulnerabilityresearch
#serversideinjection
#hackercommunity
#bughuntingcourse2021
#securityflaw
#exploit
#webapplicationsecurity
#cyberawareness
what is remote code execution
-----------------------------------------------------------------...
------------------------------------------------------------------------
Join this channel to get access to the perks:
ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin
------------------------------------------------------------------------
#bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution
#fileuploadvulnerability
#bugbounty
#ethicalhacking
#websecurity
#cybersecurity
#poc
#vulnerabilityresearch
#serversideinjection
#hackercommunity
#bughuntingcourse2021
#securityflaw
#exploit
#webapplicationsecurity
#cyberawareness
what is remote code execution
-----------------------------------------------------------------...
Просмотров: 3 417
Видео
$500 Stored Cross Site Scripting POC | Private AI/ML Bug Bounty Program 2025 | XSS in AI/ML Program
Просмотров 1,6 тыс.28 дней назад
This demonstration outlines the process of crafting and testing payloads, leveraging server environments for ethical testing, and understanding the importance of secure coding practices. A must-watch for bug bounty hunters and cybersecurity enthusiasts aiming to enhance their vulnerability assessment skills. Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZ...
$2000 bounty: Unauthenticated remote code execution to reverse shell | Bug Bounty POC 2024
Просмотров 3,5 тыс.Месяц назад
POC: Remote Code Execution It is vulnerable to unauthorized remote code execution. To reproduce the issue, access the settings page at localhost/#!/settings and navigate to the FFMPEG settings. Modify the FFMPEG Executable Path to "; cat /etc/passwd && echo 'poc'" and click the update button. After making this change, visit localhost/#!/version, where the content of the /etc/passwd file will be...
$750 bounty sensitive data exposure vulnerability by HTTP Request Smuggling | bug bounty poc 2024
Просмотров 3,3 тыс.6 месяцев назад
Gunicorn does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it Vulnerable to TE CL request smuggling. Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla ⚠️ Disclaimer: This content is solely for educational ...
$3500 Bounty Server Side Template Injection SSTI Bug Bounty Video POC | Private Bug Bounty Program
Просмотров 2,7 тыс.6 месяцев назад
The system is susceptible to a critical unauthenticated server-side template injection (SSTI) vulnerability. This allows a remote attacker to execute arbitrary code with the same privileges as the user account running the server, posing a severe security risk. Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to ...
Earn Up to $5000 bounty Monthly with This Exclusive Bug Bounty Platform....
Просмотров 1,5 тыс.6 месяцев назад
Join this exclusive bug bounty platform to earn up to $5000 monthly in rewards! Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to get access to the latest bug bounty tips: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin #bugbounty2024 #ethicalhacking #bugbountytips #vulnerabilitydisclosure #hacktheplanet #sec...
Unauthenticated SQL Injection Video POC | Open Source Bug Bounty Program
Просмотров 1,7 тыс.6 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin
$9000 Blind XXE injection Video POC | Private Bug Bounty Program 2024 | P1 Critical Vulnerability
Просмотров 3,8 тыс.7 месяцев назад
Blind XXE with out-of-band interaction | P1 Critical Vulnerability Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to get access to the latest bug bounty tips: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin #BugBounty2024 #EthicalHacking #BugBountyTips #VulnerabilityDisclosure #HackThePlanet #SecurityResearch...
$1500 bounty : authentication bypass + unauthenticated configurations access | POC | Bug Bounty 2024
Просмотров 9 тыс.7 месяцев назад
In this video, we delve into an authentication bypass vulnerability where an attacker exploits a flaw to gain initial access. By issuing a Privilege 15 command, the attacker creates a local user and password combination, allowing them to log in with normal user access. Learn how this vulnerability works and the steps to protect your systems from such exploits. Twitter: abhishekmorla...
Authentication Bypass Vulnerability Using LDAP Injection | POC | 2024
Просмотров 3,6 тыс.7 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin References: www.cobalt.io/blog/introduction-to-ldap-injection-attack github.com/fuzzdb-project/fuzzdb/blob/master/attack/ldap/ldap-injection.txt Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla
$2500 bounty: htaccess overwrite file upload vulnerability | POC | Bug Bounty 2024 | private program
Просмотров 7 тыс.9 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin . . . . . cat .htaccess AddType application/x-httpd-php .shell #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercommunity #bughuntingcourse2021 #se...
Unauthenticated Code Execution Without Metasploit | Reverse Connection | Post Exploitation Video POC
Просмотров 1,3 тыс.10 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin github.com/Ridter/redis-rce github.com/n0b0dyCN/RedisModules-ExecuteCommand Redis 4.x/5.x RCE #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercomm...
$1400 bounty File Upload Vulnerability leads to Reverse Connection | Private Bug Bounty POC 2024
Просмотров 2,6 тыс.10 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin . . #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercommunity #bughuntingcourse2021 #securityflaw #exploit #webapplicationsecurity #cyberawareness...
$1000 bounty: Remote Code Execution via Aspell Pathname | POC | Bug Bounty 2024 | Private Program
Просмотров 1,5 тыс.10 месяцев назад
$1000 bounty: Remote Code Execution via Aspell Pathname | POC | Bug Bounty 2024 | Private bug bounty Program Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla This Proof of Concept (PoC) demonstration unveils the steps behind this successful hack, showcasing how vulnerabilities can result in reverse shell. Stay tuned for an insigh...
$3900 bounty: Remote Code Execution via File Upload Vulnerability | POC | live Bug Bounty 2024
Просмотров 4 тыс.11 месяцев назад
$3900 bounty: Remote Code Execution via File Upload Vulnerability | POC | live Bug Bounty 2024
Remote Code Execution via Arbitrary File Upload Vulnerability | Bug Bounty Methodology | WordPress
Просмотров 2,9 тыс.11 месяцев назад
Remote Code Execution via Arbitrary File Upload Vulnerability | Bug Bounty Methodology | WordPress
OS Command Injection Vulnerability Bug bounty POC | Bug Bounty Methodology | Finding Injection Point
Просмотров 6 тыс.11 месяцев назад
OS Command Injection Vulnerability Bug bounty POC | Bug Bounty Methodology | Finding Injection Point
Bug Bounty Methodology Live Hunting | Remote Code Execution via SQL Vulnerability | POC 2024
Просмотров 1,7 тыс.11 месяцев назад
Bug Bounty Methodology Live Hunting | Remote Code Execution via SQL Vulnerability | POC 2024
$1000 Bounty | Command Injection Vulnerability | Bug Bounty POC
Просмотров 2,7 тыс.11 месяцев назад
$1000 Bounty | Command Injection Vulnerability | Bug Bounty POC
$2900 Bounty SQL Injection Bug Bounty POC 2024 | Private Bug Bounty Program
Просмотров 10 тыс.11 месяцев назад
$2900 Bounty SQL Injection Bug Bounty POC 2024 | Private Bug Bounty Program
$1700 Bounty | Unauthenticated Command Injection Vulnerability | Bug Bounty Methodology | POC
Просмотров 4,7 тыс.11 месяцев назад
$1700 Bounty | Unauthenticated Command Injection Vulnerability | Bug Bounty Methodology | POC
$3500 Bounty | Unauthenticated Time Based SQL Injection Bug Bounty POC | Private Bug Bounty Program
Просмотров 5 тыс.Год назад
$3500 Bounty | Unauthenticated Time Based SQL Injection Bug Bounty POC | Private Bug Bounty Program
Bug Bounty POC 2024: Remote Command Execution through Unvalidated File Upload
Просмотров 2 тыс.Год назад
Bug Bounty POC 2024: Remote Command Execution through Unvalidated File Upload
$100 Quick Win Bounty | Weak Password Policy | bug bounty tips 2024 | POC | Authentication Testing
Просмотров 1,2 тыс.Год назад
$100 Quick Win Bounty | Weak Password Policy | bug bounty tips 2024 | POC | Authentication Testing
$10,000 bounty: Unauthenticated Blind SQL Injection | POC | Private Bug Bounty Program 2024
Просмотров 7 тыс.Год назад
$10,000 bounty: Unauthenticated Blind SQL Injection | POC | Private Bug Bounty Program 2024
$3,133 bounty: Remote Code Execution via Local File Inclusion | POC | Bug Bounty 2024
Просмотров 9 тыс.Год назад
$3,133 bounty: Remote Code Execution via Local File Inclusion | POC | Bug Bounty 2024
$2100 Time Based SQL Injection Bug Bounty POC
Просмотров 11 тыс.Год назад
$2100 Time Based SQL Injection Bug Bounty POC
$800 Advanced Stored Cross Site Scripting Filter Bypass to Account Takeover | Bug Bounty PoC 2024
Просмотров 2,5 тыс.Год назад
$800 Advanced Stored Cross Site Scripting Filter Bypass to Account Takeover | Bug Bounty PoC 2024
$1900 Unauthenticated Database Credential Access through Code Execution | Bug Bounty |CVE 2023-35813
Просмотров 3,7 тыс.Год назад
$1900 Unauthenticated Database Credential Access through Code Execution | Bug Bounty |CVE 2023-35813
€7500 Unauthenticated Blind Remote Code Execution Bug Bounty POC | Private Program | CVE-2023-38646
Просмотров 8 тыс.Год назад
€7500 Unauthenticated Blind Remote Code Execution Bug Bounty POC | Private Program | CVE-2023-38646
mughe ye samaj nhi aaya ki aap get parameter apne man se whi ku dale themes/hurgas/assets/rce.php can y tell me
I see the Shellshock vulnerability for the first time in real time.
Identity not authenticated
For anyone asking for file path location. If its an opensource tool like this. Run it locally. And use find binary to search the location path.
What is the tool that your using?
Burp
Hello bro I am currently doing BCA can you help me with how I can get into cyber security as a penetration tester this will help me a lot if you give me direction towards the journey of becoming a penetration tester
Dm at linkedin
How come FOSS projects are awarding bounties?
Do some research
Did you find it with a white-box approach by doing code review or did you find it with a black-box approach?
Both
Blind rce
What is cve ? & What is your id at bug's plateform to verify that
Verify what ? Its already registered under some cve
@abhishekmorla1 what is your id
@@abhishekmorla1 cve how? eve-2021 or 22?
@ 24
@ Do you share PoCs on GitHub?
seems like its not a bug bounty u are running it on your local machine 0.0.0.0:3000 anyway awesome content
Yes it is
What's that tool ik burp suite what's the other one bro 🙄
Which one ?
Great content
Bro I confused please start with 0 how to get rce
first go learn what is rce and how its work and then this video it well be so ez for you
Sure join the channel
What cve sir
Join the channel
To company kon si thi ? Work kya karte hai ? , badhiya hai to tere kk ye bug find kar ne me 7 min laga ki warking kar r tha ? Or aorking karr tha to kitna time laga ye injection coding , kya storege bhar deta hai kya ? Ki auto script , bata Ai tool banae hai ! Sath me
finally u r back, thnx for sharing awesome content :)
First😅
Hi Abishek How TO Every Bug Bounty Program Testing You're Own Local Host Setup Right
Not every , mostly yes
Bro is this rxss
It can be converted into sxss
It's not a 500$ , this vulnerability got only 50$ to 12$. This xss vulnerability reported 3 times 1st researcher got 50$ , second got duplicate and third got spam . Read more about this go to serge git repo or huntr
Same methodology is used in ewptx exam amazing stuff love it
Is this valid for stored XSS
Look at the title ^^
No ,
Join the channel and understand how its converted to sxss
Great
Self xss!
Yes
There is a get request, by sending it to the victim it will save that chat and alert will trigger FyI : not everything i post on public If you want to know how did i convert it to stored xss then join the channel
This is lab for nahamsec what the fuck 1000$
Bro i am able to use the msf exploit with limited priv how can i escalate to get root.
Find ways to get root
Linpeas. or winpeas or Sudo -L
How to get that cracked burpsuite
join the channel
hey bro i want a little help , i want to know how we will find the location where our files get uploaded , is there any techniques or something to kknow the url where our files get uploaded
Join membership
hahaha nice try bro,how can you run a bug bounty program with local host🤣🤣
visit huntr.com/ bro
good
good
U r huntin on random FOSS projects???
Yeah
bro what's that localhost and how do you test locally... what do you use for that...
Docker
@@abhishekmorla1 learned new concept
Great finding brother
Hi Abhi I have doubt you're PUT request Web application Testing creating Channel test after exploit is completely the process proof of concept really nice giving but how to identify or You're also test each and every parameter and endpoint can you please tell mee waiting for reply dude
By understanding the application
Damn
Long time no see?
Been busy bro
Nice one ❤
😅
no videos these days?
I will start soon
Ssrf to rce ??? Bro
Do you make this payload your self??? Or if not Where are you find this payload
Github
Bro casually dropped a zero day
great video, but it should be watch at x0.50 speed
Finally you solved my problem of how to get interactive shell and port forwarding with ngrok 🎉❤
That is not vulnerability
Ok
Nice is it your own 0day or you used a 0day from exploitdb like that
Exploit db like that
Hi can you please link cve id you exploited and is it in nuclei templates?
Join channel