Hunting IDOR with Z-winK (Part 2)

Поделиться
HTML-код
  • Опубликовано: 1 фев 2025

Комментарии • 37

  • @kittoh_
    @kittoh_ Год назад +9

    This is one of the few videos that is legitimately teaching actual knowledge. Hoping his channel would come back.

  • @CodingQuan
    @CodingQuan Год назад

    One of the cleanest easy to understand videos on the topic!! 💯Bravo

  • @ciconid
    @ciconid 10 месяцев назад

    Great video!!! Loved the phrase "It doesn't require rocket surgery" :)

  • @wardellcastles
    @wardellcastles 2 года назад +13

    Great video!
    In my research into hacking APIs, rarely do I find IDs in the GET request. If I see any ids they are highly encoded in the cookie. What do you do when you see this?

  • @CodeAcademia00
    @CodeAcademia00 Год назад +1

    Thank you man , thats so amazingly helpful ❤

  • @haanrey
    @haanrey 2 года назад +1

    I like when ryan reynolds himself teachers IDOR !! Just Awesome !!

  • @ZaG-yo3fd
    @ZaG-yo3fd Год назад

    Great explanation! Thanks Z-winK😁🙌✌💪

  • @techguru5230
    @techguru5230 2 года назад +5

    where is part1

  • @diegopirela9808
    @diegopirela9808 2 года назад +2

    thank for information bro you are great

  • @modmah7191
    @modmah7191 2 года назад

    thanks for the amazing video!
    please make more content about another vulnerabilities.

  • @birch8005
    @birch8005 2 года назад +3

    Z-winK, when you are testing for idor, which are not numerical values can you irritate over the list not exposing sensitive information?🤔

  • @tayyabch2868
    @tayyabch2868 2 года назад

    Nice tutorial. I have been having content issues with my hmdi connected speaker and subwoofer. No soft is coming through, still coming out of

  • @CWLabs7209
    @CWLabs7209 2 года назад +1

    Awesome video 😄 ❤.

  • @nikeshrajbanshi647
    @nikeshrajbanshi647 2 года назад +1

    very helpful video

  • @extrabgmi2788
    @extrabgmi2788 2 года назад

    very very gooood, thaaankss maan

  • @HelloWorld-r2c
    @HelloWorld-r2c Год назад

    Where is part 1 plz

  • @robot67799
    @robot67799 2 года назад

    26:51 Damn, that's cool

  • @robot67799
    @robot67799 2 года назад

    Thank-you ✨

  • @ArSiddharth
    @ArSiddharth 2 года назад +1

    I want to start bug bounty...
    And I just don't wanna start, I also want to find bugs,
    So first I have to learn then I will do this
    so where do i start learning.

    • @wardellcastles
      @wardellcastles 2 года назад +1

      Portswigger Web Academy is a good place to start.

    • @haksting
      @haksting 2 года назад

      @@wardellcastles +1

  • @aliuzun8885
    @aliuzun8885 11 месяцев назад

    Ty

  • @imosolar
    @imosolar Год назад

    Please what about the cookie swap with accounts

  • @andrewalba369
    @andrewalba369 2 года назад +1

    project a lot because I've been working on other stuff (and being lazy lol). Also, I had been facing a recurring problem of content dropouts in

  • @sharifulislamshupol8364
    @sharifulislamshupol8364 2 года назад

    What is this site/ others?
    How to works in this site?
    plz help me.

  • @WaseemAkram-kx7tq
    @WaseemAkram-kx7tq 2 года назад +5

    Where is first part ?

  • @UK-TECH-
    @UK-TECH- 2 года назад

    The GMS that you use here is completely different softing than the one I use even though I'm using tNice tutorials exact software, why is tNice tutorials?

  • @StephenOgu
    @StephenOgu 2 года назад

    Favorite bugs 🐛

  • @gitanshgulati1732
    @gitanshgulati1732 2 года назад +1

    I procrastinated for 6 years

  • @thewholeworldblurred
    @thewholeworldblurred 2 года назад +2

    All his videos are gone

  • @Aditya-vv3sq
    @Aditya-vv3sq 2 года назад

    !

  • @EhsanEnglishCare2000
    @EhsanEnglishCare2000 2 года назад

    lmao XDDD

  • @samindunimsara
    @samindunimsara 2 года назад +1

    If you saw api/detaback/?ad_id=1234577

  • @prabuinet
    @prabuinet Год назад

    where is part 1