Real Bugs - API Information Disclosure

Поделиться
HTML-код
  • Опубликовано: 10 сен 2024

Комментарии • 78

  • @TCMSecurityAcademy
    @TCMSecurityAcademy  3 года назад +6

    I hope you enjoyed this video! If so, please consider dropping a like and subscribing.

  • @InsiderPhD
    @InsiderPhD 4 года назад +81

    Thank you so much for the shoutout! I'm actually working on some new API videos coming real soon including more recon techniques, understanding JSON, API hacking tools like Postman so stay tuned for even more API goodness!

  • @volatileobj3cts
    @volatileobj3cts 2 года назад

    Total side note. This is the first time I've actually ever NEEDED the sponsor of a RUclips video.

  • @LTT.Official
    @LTT.Official 4 года назад +11

    Great stuff as usual Heath, just finished the Udemy course, thoroughly enjoyed it.

    • @abdulsamad-as
      @abdulsamad-as 4 года назад

      Did you find any real world bug by using that course info???

    • @LTT.Official
      @LTT.Official 4 года назад

      @@abdulsamad-as actually yes, it better refined my vulnerability assessment skills I undertake for work, helped me be more efficient.

    • @theintrovert894
      @theintrovert894 3 года назад

      Can u give me thar course Plzzz❤️

    • @watchlistsclips3196
      @watchlistsclips3196 3 года назад

      @@theintrovert894 Why can't u just buy the course.It is a gold mine actually.It should be given for 2000$ for what he is teaching.He gives u more content covering all areas.Why can't u just buy it.Just buy the course.No one going to give you this and mr.cybermentor deserve to get some support.

  • @crassProgrammer
    @crassProgrammer 4 года назад +1

    You are taking out time to make these videos and help people like me to learn more, that's very much great. Thank you very much man and i expect many more videos.

  • @laurent9255
    @laurent9255 3 года назад +1

    burp intruder is just a multithreaded fuzzing script that can be made in pure python . Worth the effort .

  • @tucanh7781
    @tucanh7781 Год назад +1

    Thanks mentor, it's very useful!

  • @HackinGeeK
    @HackinGeeK 2 года назад

    Thank you man for the insiderPHD

  • @didyouknowamazingfacts2790
    @didyouknowamazingfacts2790 4 месяца назад

    That's really F'ed up that company didn't even acknowledge you or say thank you.

  • @joeyalfaro2323
    @joeyalfaro2323 3 года назад

    I remember looking at hacker one bounty selection. I'm not gonna read all this so copy and pasted words to voice. Then made list ones that were paying money. Wasted bunch time learning burp suite what nightmare. I take notes get ideas what learn next. Sometimes you have submerge yourself in topic run with idea. I'm deeply involved in self sabotage. Saying nothing ever panned out why should this be any different. One guy had some great advice to himself if he was just starting find your first bug. Good recon all vulnerabilities. Part learning figuring it out yourself

  • @virajchoksi7845
    @virajchoksi7845 4 года назад +1

    Great! Make this your new series: ' Real bug series'. Add real world bug hunting recon streams as well if possible. Or else just some poc videos.

  • @0xsunil
    @0xsunil 4 года назад +1

    By fuzzing one can get
    GET /api-2.0/sms/
    But your blurred screenshots shows there was something more than that I mean,
    GET /api-2.0/sms/blurred-content/
    Does that mean you won't get any PII data back in response when you just hit:
    GET /api-2.0/sms/
    Just a noob here. Trying to understand. Thanks for read and/or reply.

  • @SatishSharma-gt5vo
    @SatishSharma-gt5vo 4 года назад

    Like as always, great stuff. Thanks for all the awesome information and resources.

  • @adityapaithon6499
    @adityapaithon6499 4 года назад +3

    Thanks dude, really informative

  • @logmantarig
    @logmantarig 3 года назад

    Really thanks very much, that's gonna help a lot with API enumeration

  • @Z0nd4
    @Z0nd4 Год назад

    Very useful. Thanks!

  • @syedz7805
    @syedz7805 4 года назад +1

    TCM - you are really my inspiration

  • @KIRIKTECH
    @KIRIKTECH 4 года назад +2

    Informative video sir😍 tq

  • @kishorebolt3065
    @kishorebolt3065 4 года назад

    Thank you TCM I had 0 idea of api. This helped me a lot

  • @aviralgupta9869
    @aviralgupta9869 4 года назад +4

    Any tips if u can share to find vulnerable parameters any tool will be a great help currently I use gf pattern with gau .

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  4 года назад +1

      Ffuf and arjun are good, but I always go back to burp

    • @aviralgupta9869
      @aviralgupta9869 4 года назад +1

      @@TCMSecurityAcademy thnx

    • @aviralgupta9869
      @aviralgupta9869 4 года назад

      @@TCMSecurityAcademy I came to know from various people that js files in website contains some juicy content can u tell me a kind of tool which can I used to download all js files without manualy going to burp to see individually

  • @bobbychase5616
    @bobbychase5616 4 года назад +2

    one on one sounds aweome!
    i need a mentor

    • @prtk4055
      @prtk4055 4 года назад +1

      Ikr, heath would be such a great mentor to have.

    • @hilsoville1
      @hilsoville1 2 года назад

      You'll probably find them in the CYBER space

  • @nareshg7292
    @nareshg7292 2 года назад

    why did d rate limiting not kick u out while fuzzing ?

  • @aniketpatel8655
    @aniketpatel8655 4 года назад +1

    Too much informative video 👍

  • @iqyou-gw4kd
    @iqyou-gw4kd Год назад

    Can you give me requirements for application Android pantest

  • @infohacking
    @infohacking 4 года назад

    Always love you sir😊....love from India 🇮🇳🇮🇳

  • @nadakuditigopikrishna6587
    @nadakuditigopikrishna6587 3 года назад

    Thank you for nice content!

  • @parthasarathidas6217
    @parthasarathidas6217 3 года назад

    Thanks Mentor awesome content as always 😎😎😎

  • @RashtrwadiHarshitSanatani
    @RashtrwadiHarshitSanatani 3 года назад

    Thank you brother ❤️

  • @rajipandya3574
    @rajipandya3574 4 года назад

    You are truly The Cyber Mentor!!

  • @ahmedalsanosi5538
    @ahmedalsanosi5538 4 года назад

    Thanks for sharing this 🙂

  • @theoffsecguy9406
    @theoffsecguy9406 4 года назад +2

    Every time You Nailed with pretty much great resources ! \O/ thenksssssssssss @TheCyberMentor

  • @tester2619
    @tester2619 4 года назад

    so are u fuzzing the parameter of `/sms/` path?

  • @nanocybersec1316
    @nanocybersec1316 3 года назад

    Again man you on Fire excellent

  • @sachinbhatt4487
    @sachinbhatt4487 4 года назад +4

    TCM♥️🔥🔥

  • @damani9060
    @damani9060 4 года назад

    legend as always thank you for the content.

  • @yutup509
    @yutup509 4 года назад

    Thanks man, you are the best

  • @AbhishekSingh-qh9df
    @AbhishekSingh-qh9df 4 года назад

    Can you please release a course on api pentesting or web application penetration testing

  • @MrKarn0007
    @MrKarn0007 4 года назад

    thank you forever bro

  • @krishnathakur7982
    @krishnathakur7982 4 года назад

    Hi Heath,
    Can you create some CTF like stuff related to API testing so we can understand more deeply.

  • @youfauchiha8531
    @youfauchiha8531 4 года назад +3

    That T-shirt should say: Amber is my fuel 😂😂 thanks for your videos man, you're the best

  • @jainishpandya4246
    @jainishpandya4246 3 года назад

    Superb

  • @saqibarif7144
    @saqibarif7144 3 года назад

    Great

  • @AN0NPH03N1X
    @AN0NPH03N1X 4 года назад

    mate, after you found the sms parameter, what did you append to it next , like sms/?(it was blurred in your video) and how did you obtained that parameter after /sms/?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  4 года назад +3

      It auto-appended stuff at the end, but it could have been an indicator of the platform, so I blurred it. The method I showed was exactly how it was found.

    • @crassProgrammer
      @crassProgrammer 4 года назад

      @@TCMSecurityAcademy Thanks man this helped me a lot.

  • @vishnuvardhanvanaparthi7002
    @vishnuvardhanvanaparthi7002 4 года назад

    Great stuff

  • @akshaydeodare6149
    @akshaydeodare6149 4 года назад

    I couldn't have maintained such calmness if that happened to me ⚡️! Cant stand bad programs tbh

  • @tobypuschmann8639
    @tobypuschmann8639 4 года назад

    Wait, you do 1:1 ?!?!?! Yes please !!!

  • @picanzo
    @picanzo 4 года назад

    Wow men, what a shitty actitud from that program!! And this video... super pratical and educational.. Its good to have videos where you real situations examples. Much easier to understand!!

  • @StefanRows
    @StefanRows 4 года назад

    Like + Comment ofc :)

  • @balaamuthan6408
    @balaamuthan6408 4 года назад

    Longtime no see

  • @cysantosh6530
    @cysantosh6530 4 года назад +2

    Sir after a long time...! Anyways stay safe and give knowledge that safely 😅
    .
    Support from my side always 🇮🇳🔥

  • @debprasadbanerjee5005
    @debprasadbanerjee5005 3 года назад

    Damn, we don't deserve this quality content

  • @AmitSingh-sb5nr
    @AmitSingh-sb5nr 4 года назад

    I am stil not able to join your discord server

  • @TheCyberExpert
    @TheCyberExpert 4 года назад +2

    It took you so long to post a video

  • @V1P3R05
    @V1P3R05 4 года назад

    How can I get a one-on-one with you?🤔🤔

    • @luismejia857
      @luismejia857 4 года назад

      tcm-sec.com/one-on-one-tutoring/

  • @ca7986
    @ca7986 4 года назад

    ❤️

  • @ndanilo
    @ndanilo 4 года назад +1

    sup

  • @dondoukhan4942
    @dondoukhan4942 4 года назад

    👾👾👾

  • @thanoscar7822
    @thanoscar7822 4 года назад

    OMG no way do you like listening to Jonathan Young songs ? i would never imagine lol, anyway thanks for the video very helpful !!!

  • @AN0NPH03N1X
    @AN0NPH03N1X 4 года назад +2

    You are love man

  • @yosoffmalik9135
    @yosoffmalik9135 4 года назад