Commonly Misunderstood Bugs: Authorization Based Vulnerabilities

Поделиться
HTML-код
  • Опубликовано: 16 ноя 2024

Комментарии • 48

  • @MikkoRantalainen
    @MikkoRantalainen 3 года назад +1

    Thanks for the TOC with clear headers and timestamps! I wish more channels did this with their videos.

    • @codingo
      @codingo  3 года назад +1

      Thanks! I usually aim to do it on longer content.

  • @tess9824
    @tess9824 3 года назад +4

    Amazing content !

    • @codingo
      @codingo  3 года назад +1

      Appreciate it!

  • @mi2has
    @mi2has 3 года назад +2

    very informative. i do not know if it is possible for you but you can run down 5 worst reports you see as triager and how they could have been imporoved and what could real impact can be . i am not sure you are actually working as triager or not but hopefully u got my point

    • @codingo
      @codingo  3 года назад +2

      So I kind of work as a triager - I manage the Bugcrowd team. I'm often on queue though! I have a video in mind for it, but there's some other content others are working on that hits on this first and I'm waiting until that's out so I don't step on any toes. I recommend watching Nahamcon - reporting content there!

    • @mi2has
      @mi2has 3 года назад

      @@codingo good to know ! thanks alot for consideration

  • @worldinternauta
    @worldinternauta 3 года назад +2

    Really helpful video, I gonna spend more time learning how to use autorize, seems to be an extension all pros use.

    • @codingo
      @codingo  3 года назад +1

      Great to hear! I think so - going to do a video on it soon.

  • @RespectableMan-ci2jb
    @RespectableMan-ci2jb 3 года назад

    Really great content. Definitely got some value out of this one.

    • @codingo
      @codingo  3 года назад

      Glad to hear it!

  • @d3vashishs0ni
    @d3vashishs0ni 3 года назад +1

    Just a question: -
    what about sending username and password in get request over HTTPS?? is it a vulnerability or not

    • @codingo
      @codingo  3 года назад +2

      Depends on a few factors, mostly cache headers. Basically - think back to "as an attacker I could" - if there's no cache headers, you could get that information from cache later. In general, yes, likely reportable.

    • @d3vashishs0ni
      @d3vashishs0ni 3 года назад

      @@codingo thanks for the information

    • @MikkoRantalainen
      @MikkoRantalainen 3 года назад

      I think it's a vulnerability because per HTTP spec user agent *history* mechanism is different from *cache* and even if the server responds with "no-store" to avoid caching, the GET URL may still be included in the history even if the response is not stored in the cache.
      However, if the expected use case is that end users save user name and password in their browser and the browser doesn't require password to decrypt keyring, there's no additional risk in practice.
      I wouldn't send any true secrets (e.g. user defined password) over HTTP GET.

    • @d3vashishs0ni
      @d3vashishs0ni 3 года назад +1

      @@MikkoRantalainen got NA 😂😂

  • @nathangriffiths8809
    @nathangriffiths8809 3 года назад

    Good job! Thanks.

  • @hacklearndaily
    @hacklearndaily 3 года назад

    Thanks for clarification on these bugs 😀

  • @bsysop
    @bsysop 3 года назад

    Great as always!.

    • @codingo
      @codingo  3 года назад +1

      Thank you! Cheers!

  • @pratitibanerjee8723
    @pratitibanerjee8723 3 года назад

    How much time we need to wait regarding session management bugs like 1hour or 6 hours to check?

    • @codingo
      @codingo  3 года назад +1

      As a general rule, over 30mins would suffice. It's not typically awarded on bounty programs, however

    • @pratitibanerjee8723
      @pratitibanerjee8723 3 года назад

      @@codingo ohh thanks for the info

  • @b3ast407
    @b3ast407 3 года назад

    Thankyou very much for this informative video.

    • @codingo
      @codingo  3 года назад +1

      Glad it was helpful!

  • @mrigakshigoel7813
    @mrigakshigoel7813 3 года назад

    Great video

  • @shivamnegi1513
    @shivamnegi1513 3 года назад

    Thanks for the content! :D

    • @codingo
      @codingo  3 года назад

      My pleasure!

  • @angeldev96
    @angeldev96 3 года назад

    Quality content as always

    • @codingo
      @codingo  3 года назад

      Appreciate it! Thank-you!

  • @sheikhrishad9233
    @sheikhrishad9233 3 года назад

    Awesome!

  • @rhidayahh
    @rhidayahh 10 месяцев назад

    Hmm my favorite bugs

  • @KathanPatel
    @KathanPatel 3 года назад

    and I was searching for pentesterlab code

    • @codingo
      @codingo  3 года назад

      There's one.. more subtle, got to watch the content to find it :)

    • @KathanPatel
      @KathanPatel 3 года назад

      @@codingo before even seeing full it got away, please make it little slow next time

  • @ventilaterr42
    @ventilaterr42 3 года назад

    No codes ?

    • @codingo
      @codingo  3 года назад

      There is one in here :)

  • @sachinmaurya3259
    @sachinmaurya3259 3 года назад +1

    3

  • @ctfspot5691
    @ctfspot5691 3 года назад +1

    2nd

  • @syedumararfeen8146
    @syedumararfeen8146 3 года назад +1

    First :3

  • @abartandhakal4122
    @abartandhakal4122 3 года назад

    Am I first? :P

    • @codingo
      @codingo  3 года назад +1

      Fourth :o

    • @abartandhakal4122
      @abartandhakal4122 3 года назад

      People are faster than me 🤦🏽‍♂️ + it's midnight 😂 Time is against me too.