Abhishek Morla
Abhishek Morla
  • Видео 59
  • Просмотров 342 204
$2500 Bounty | remote code execution Bug Bounty POC | Bug Bounty Program 2025 | command injection
Remote code execution due to the insecure use of the eval function
------------------------------------------------------------------------
Join this channel to get access to the perks:
ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin
------------------------------------------------------------------------
#bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution
#fileuploadvulnerability
#bugbounty
#ethicalhacking
#websecurity
#cybersecurity
#poc
#vulnerabilityresearch
#serversideinjection
#hackercommunity
#bughuntingcourse2021
#securityflaw
#exploit
#webapplicationsecurity
#cyberawareness
what is remote code execution
-----------------------------------------------------------------...
Просмотров: 3 417

Видео

$500 Stored Cross Site Scripting POC | Private AI/ML Bug Bounty Program 2025 | XSS in AI/ML Program
Просмотров 1,6 тыс.28 дней назад
This demonstration outlines the process of crafting and testing payloads, leveraging server environments for ethical testing, and understanding the importance of secure coding practices. A must-watch for bug bounty hunters and cybersecurity enthusiasts aiming to enhance their vulnerability assessment skills. Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZ...
$2000 bounty: Unauthenticated remote code execution to reverse shell | Bug Bounty POC 2024
Просмотров 3,5 тыс.Месяц назад
POC: Remote Code Execution It is vulnerable to unauthorized remote code execution. To reproduce the issue, access the settings page at localhost/#!/settings and navigate to the FFMPEG settings. Modify the FFMPEG Executable Path to "; cat /etc/passwd && echo 'poc'" and click the update button. After making this change, visit localhost/#!/version, where the content of the /etc/passwd file will be...
$750 bounty sensitive data exposure vulnerability by HTTP Request Smuggling | bug bounty poc 2024
Просмотров 3,3 тыс.6 месяцев назад
Gunicorn does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it Vulnerable to TE CL request smuggling. Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla ⚠️ Disclaimer: This content is solely for educational ...
$3500 Bounty Server Side Template Injection SSTI Bug Bounty Video POC | Private Bug Bounty Program
Просмотров 2,7 тыс.6 месяцев назад
The system is susceptible to a critical unauthenticated server-side template injection (SSTI) vulnerability. This allows a remote attacker to execute arbitrary code with the same privileges as the user account running the server, posing a severe security risk. Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to ...
Earn Up to $5000 bounty Monthly with This Exclusive Bug Bounty Platform....
Просмотров 1,5 тыс.6 месяцев назад
Join this exclusive bug bounty platform to earn up to $5000 monthly in rewards! Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to get access to the latest bug bounty tips: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin #bugbounty2024 #ethicalhacking #bugbountytips #vulnerabilitydisclosure #hacktheplanet #sec...
Unauthenticated SQL Injection Video POC | Open Source Bug Bounty Program
Просмотров 1,7 тыс.6 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin
$9000 Blind XXE injection Video POC | Private Bug Bounty Program 2024 | P1 Critical Vulnerability
Просмотров 3,8 тыс.7 месяцев назад
Blind XXE with out-of-band interaction | P1 Critical Vulnerability Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to get access to the latest bug bounty tips: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin #BugBounty2024 #EthicalHacking #BugBountyTips #VulnerabilityDisclosure #HackThePlanet #SecurityResearch...
$1500 bounty : authentication bypass + unauthenticated configurations access | POC | Bug Bounty 2024
Просмотров 9 тыс.7 месяцев назад
In this video, we delve into an authentication bypass vulnerability where an attacker exploits a flaw to gain initial access. By issuing a Privilege 15 command, the attacker creates a local user and password combination, allowing them to log in with normal user access. Learn how this vulnerability works and the steps to protect your systems from such exploits. Twitter: abhishekmorla...
Authentication Bypass Vulnerability Using LDAP Injection | POC | 2024
Просмотров 3,6 тыс.7 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin References: www.cobalt.io/blog/introduction-to-ldap-injection-attack github.com/fuzzdb-project/fuzzdb/blob/master/attack/ldap/ldap-injection.txt Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla
$2500 bounty: htaccess overwrite file upload vulnerability | POC | Bug Bounty 2024 | private program
Просмотров 7 тыс.9 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin . . . . . cat .htaccess AddType application/x-httpd-php .shell #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercommunity #bughuntingcourse2021 #se...
Unauthenticated Code Execution Without Metasploit | Reverse Connection | Post Exploitation Video POC
Просмотров 1,3 тыс.10 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin github.com/Ridter/redis-rce github.com/n0b0dyCN/RedisModules-ExecuteCommand Redis 4.x/5.x RCE #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercomm...
$1400 bounty File Upload Vulnerability leads to Reverse Connection | Private Bug Bounty POC 2024
Просмотров 2,6 тыс.10 месяцев назад
Join this channel to get access to the perks: ruclips.net/channel/UC9IAh1JN4lhSVz193GvZVZgjoin . . #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercommunity #bughuntingcourse2021 #securityflaw #exploit #webapplicationsecurity #cyberawareness...
$1000 bounty: Remote Code Execution via Aspell Pathname | POC | Bug Bounty 2024 | Private Program
Просмотров 1,5 тыс.10 месяцев назад
$1000 bounty: Remote Code Execution via Aspell Pathname | POC | Bug Bounty 2024 | Private bug bounty Program Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla This Proof of Concept (PoC) demonstration unveils the steps behind this successful hack, showcasing how vulnerabilities can result in reverse shell. Stay tuned for an insigh...
$3900 bounty: Remote Code Execution via File Upload Vulnerability | POC | live Bug Bounty 2024
Просмотров 4 тыс.11 месяцев назад
$3900 bounty: Remote Code Execution via File Upload Vulnerability | POC | live Bug Bounty 2024
Remote Code Execution via Arbitrary File Upload Vulnerability | Bug Bounty Methodology | WordPress
Просмотров 2,9 тыс.11 месяцев назад
Remote Code Execution via Arbitrary File Upload Vulnerability | Bug Bounty Methodology | WordPress
OS Command Injection Vulnerability Bug bounty POC | Bug Bounty Methodology | Finding Injection Point
Просмотров 6 тыс.11 месяцев назад
OS Command Injection Vulnerability Bug bounty POC | Bug Bounty Methodology | Finding Injection Point
Bug Bounty Methodology Live Hunting | Remote Code Execution via SQL Vulnerability | POC 2024
Просмотров 1,7 тыс.11 месяцев назад
Bug Bounty Methodology Live Hunting | Remote Code Execution via SQL Vulnerability | POC 2024
$1000 Bounty | Command Injection Vulnerability | Bug Bounty POC
Просмотров 2,7 тыс.11 месяцев назад
$1000 Bounty | Command Injection Vulnerability | Bug Bounty POC
$2900 Bounty SQL Injection Bug Bounty POC 2024 | Private Bug Bounty Program
Просмотров 10 тыс.11 месяцев назад
$2900 Bounty SQL Injection Bug Bounty POC 2024 | Private Bug Bounty Program
$1700 Bounty | Unauthenticated Command Injection Vulnerability | Bug Bounty Methodology | POC
Просмотров 4,7 тыс.11 месяцев назад
$1700 Bounty | Unauthenticated Command Injection Vulnerability | Bug Bounty Methodology | POC
$3500 Bounty | Unauthenticated Time Based SQL Injection Bug Bounty POC | Private Bug Bounty Program
Просмотров 5 тыс.Год назад
$3500 Bounty | Unauthenticated Time Based SQL Injection Bug Bounty POC | Private Bug Bounty Program
Bug Bounty POC 2024: Remote Command Execution through Unvalidated File Upload
Просмотров 2 тыс.Год назад
Bug Bounty POC 2024: Remote Command Execution through Unvalidated File Upload
$100 Quick Win Bounty | Weak Password Policy | bug bounty tips 2024 | POC | Authentication Testing
Просмотров 1,2 тыс.Год назад
$100 Quick Win Bounty | Weak Password Policy | bug bounty tips 2024 | POC | Authentication Testing
$10,000 bounty: Unauthenticated Blind SQL Injection | POC | Private Bug Bounty Program 2024
Просмотров 7 тыс.Год назад
$10,000 bounty: Unauthenticated Blind SQL Injection | POC | Private Bug Bounty Program 2024
$3,133 bounty: Remote Code Execution via Local File Inclusion | POC | Bug Bounty 2024
Просмотров 9 тыс.Год назад
$3,133 bounty: Remote Code Execution via Local File Inclusion | POC | Bug Bounty 2024
$2100 Time Based SQL Injection Bug Bounty POC
Просмотров 11 тыс.Год назад
$2100 Time Based SQL Injection Bug Bounty POC
$800 Advanced Stored Cross Site Scripting Filter Bypass to Account Takeover | Bug Bounty PoC 2024
Просмотров 2,5 тыс.Год назад
$800 Advanced Stored Cross Site Scripting Filter Bypass to Account Takeover | Bug Bounty PoC 2024
$1900 Unauthenticated Database Credential Access through Code Execution | Bug Bounty |CVE 2023-35813
Просмотров 3,7 тыс.Год назад
$1900 Unauthenticated Database Credential Access through Code Execution | Bug Bounty |CVE 2023-35813
€7500 Unauthenticated Blind Remote Code Execution Bug Bounty POC | Private Program | CVE-2023-38646
Просмотров 8 тыс.Год назад
€7500 Unauthenticated Blind Remote Code Execution Bug Bounty POC | Private Program | CVE-2023-38646

Комментарии

  • @lojenskumar6113
    @lojenskumar6113 День назад

    mughe ye samaj nhi aaya ki aap get parameter apne man se whi ku dale themes/hurgas/assets/rce.php can y tell me

  • @Thirumurug0xan
    @Thirumurug0xan 13 дней назад

    I see the Shellshock vulnerability for the first time in real time.

  • @melihcansayn3368
    @melihcansayn3368 14 дней назад

    Identity not authenticated

  • @addliam
    @addliam 17 дней назад

    For anyone asking for file path location. If its an opensource tool like this. Run it locally. And use find binary to search the location path.

  • @SaiSwethaSrinivas2019
    @SaiSwethaSrinivas2019 23 дня назад

    What is the tool that your using?

  • @mrbunny4983
    @mrbunny4983 24 дня назад

    Hello bro I am currently doing BCA can you help me with how I can get into cyber security as a penetration tester this will help me a lot if you give me direction towards the journey of becoming a penetration tester

  • @cyberdude3310
    @cyberdude3310 25 дней назад

    How come FOSS projects are awarding bounties?

  • @0xbro
    @0xbro 25 дней назад

    Did you find it with a white-box approach by doing code review or did you find it with a black-box approach?

  • @zxcvdev276
    @zxcvdev276 25 дней назад

    Blind rce

  • @techworld909
    @techworld909 25 дней назад

    What is cve ? & What is your id at bug's plateform to verify that

  • @MikeMasanga
    @MikeMasanga 25 дней назад

    seems like its not a bug bounty u are running it on your local machine 0.0.0.0:3000 anyway awesome content

  • @Toxic_Talons
    @Toxic_Talons 26 дней назад

    What's that tool ik burp suite what's the other one bro 🙄

  • @sambhavjain6929
    @sambhavjain6929 26 дней назад

    Great content

  • @ghostt784
    @ghostt784 26 дней назад

    Bro I confused please start with 0 how to get rce

    • @Gazawkawk
      @Gazawkawk 26 дней назад

      first go learn what is rce and how its work and then this video it well be so ez for you

    • @abhishekmorla1
      @abhishekmorla1 26 дней назад

      Sure join the channel

  • @nguyetnam1328
    @nguyetnam1328 26 дней назад

    What cve sir

  • @internetEasywithbro-np9ef
    @internetEasywithbro-np9ef 26 дней назад

    To company kon si thi ? Work kya karte hai ? , badhiya hai to tere kk ye bug find kar ne me 7 min laga ki warking kar r tha ? Or aorking karr tha to kitna time laga ye injection coding , kya storege bhar deta hai kya ? Ki auto script , bata Ai tool banae hai ! Sath me

  • @j4ck_d4niels
    @j4ck_d4niels 26 дней назад

    finally u r back, thnx for sharing awesome content :)

  • @learn7352
    @learn7352 26 дней назад

    First😅

  • @testwebsitebug
    @testwebsitebug 27 дней назад

    Hi Abishek How TO Every Bug Bounty Program Testing You're Own Local Host Setup Right

  • @MuukuNoondi
    @MuukuNoondi 28 дней назад

    Bro is this rxss

  • @Mr-Horbio
    @Mr-Horbio 29 дней назад

    It's not a 500$ , this vulnerability got only 50$ to 12$. This xss vulnerability reported 3 times 1st researcher got 50$ , second got duplicate and third got spam . Read more about this go to serge git repo or huntr

  • @ipadmini5gaming20
    @ipadmini5gaming20 29 дней назад

    Same methodology is used in ewptx exam amazing stuff love it

  • @nsmotivational6622
    @nsmotivational6622 29 дней назад

    Is this valid for stored XSS

  • @sambhavjain6929
    @sambhavjain6929 29 дней назад

    Great

  • @gladiatorsec8037
    @gladiatorsec8037 Месяц назад

    Self xss!

    • @abhinavbansal9396
      @abhinavbansal9396 29 дней назад

      Yes

    • @abhishekmorla1
      @abhishekmorla1 29 дней назад

      There is a get request, by sending it to the victim it will save that chat and alert will trigger FyI : not everything i post on public If you want to know how did i convert it to stored xss then join the channel

  • @mohammedyettou-q1r
    @mohammedyettou-q1r Месяц назад

    This is lab for nahamsec what the fuck 1000$

  • @whoami-404
    @whoami-404 Месяц назад

    Bro i am able to use the msf exploit with limited priv how can i escalate to get root.

  • @Raaz-hd2si
    @Raaz-hd2si Месяц назад

    How to get that cracked burpsuite

  • @bugooos
    @bugooos Месяц назад

    hey bro i want a little help , i want to know how we will find the location where our files get uploaded , is there any techniques or something to kknow the url where our files get uploaded

  • @MikeMasanga
    @MikeMasanga Месяц назад

    hahaha nice try bro,how can you run a bug bounty program with local host🤣🤣

  • @ExploitDeveloper
    @ExploitDeveloper Месяц назад

    good

  • @ExploitDeveloper
    @ExploitDeveloper Месяц назад

    good

  • @abhinavbansal9396
    @abhinavbansal9396 Месяц назад

    U r huntin on random FOSS projects???

  • @name_karan
    @name_karan Месяц назад

    bro what's that localhost and how do you test locally... what do you use for that...

  • @bugbounty_learns
    @bugbounty_learns Месяц назад

    Great finding brother

  • @testwebsitebug
    @testwebsitebug Месяц назад

    Hi Abhi I have doubt you're PUT request Web application Testing creating Channel test after exploit is completely the process proof of concept really nice giving but how to identify or You're also test each and every parameter and endpoint can you please tell mee waiting for reply dude

  • @FICTICIOUS-ij2js
    @FICTICIOUS-ij2js Месяц назад

    Damn

  • @sheikhzaid9_9
    @sheikhzaid9_9 Месяц назад

    Long time no see?

  • @kartavyasingh643
    @kartavyasingh643 Месяц назад

    Nice one ❤

  • @SapphireXwd
    @SapphireXwd 2 месяца назад

    😅

  • @j4ck_d4niels
    @j4ck_d4niels 2 месяца назад

    no videos these days?

  • @MR_GAMER-e4g
    @MR_GAMER-e4g 2 месяца назад

    Ssrf to rce ??? Bro

  • @techworld909
    @techworld909 2 месяца назад

    Do you make this payload your self??? Or if not Where are you find this payload

  • @hammadzaki7534
    @hammadzaki7534 2 месяца назад

    Bro casually dropped a zero day

  • @gral10
    @gral10 2 месяца назад

    great video, but it should be watch at x0.50 speed

  • @MrHome-i9v
    @MrHome-i9v 3 месяца назад

    Finally you solved my problem of how to get interactive shell and port forwarding with ngrok 🎉❤

  • @snipertech365
    @snipertech365 3 месяца назад

    That is not vulnerability

  • @studiospan6426
    @studiospan6426 3 месяца назад

    Nice is it your own 0day or you used a 0day from exploitdb like that

  • @studiospan6426
    @studiospan6426 3 месяца назад

    Hi can you please link cve id you exploited and is it in nuclei templates?