Hi! Welcome to the comment section! I hope you enjoyed the video! Get the first issue of BBRE newsletter: mailing.bugbountyexplained.com/news1 You have time until Saturday 8th May to sign up if you want to receive the 2nd newsletter.
Another fantastic explanation, super concise and easy to understand as always! Thanks for working so hard to keep us update to date and informed. Noticing that little distinction in the source code between converting to int for accessing the page but not when setting the cookie val as a 14 and 17 year old is seriously impressive. Not to mention the cookie scoping bypasses afterwards. Pretty sure at that age I was nothing more than a dumb script kiddie pressing buttons on Havij 😂
Thank you Andrew. If someone would tell me that guys in such age found a $35k bug, I would think it's maybe an IDOR, some business logic or something like that but Id never think a chain like this..
You the man, i love your videos, and the time you put into them. I was always wondering when someone would, reverse engineer the bugs so we can see how they went about finding the bug, along with a proof of concept. I knew the young wipper snappers would rise up and make my job even harder, lol. I love that shirt, looks good on you. I go the gym as well, have to fill out my club shirts, hehe.
Hi! Welcome to the comment section! I hope you enjoyed the video!
Get the first issue of BBRE newsletter: mailing.bugbountyexplained.com/news1
You have time until Saturday 8th May to sign up if you want to receive the 2nd newsletter.
It's amazing how 2 high school students did all that! now those are some newborn legends
RUclips open redirection ruclips.net/video/aSS23VHAqbU/видео.html
Clear and concise explaination . thankyou for helping the community .
Another fantastic explanation, super concise and easy to understand as always! Thanks for working so hard to keep us update to date and informed. Noticing that little distinction in the source code between converting to int for accessing the page but not when setting the cookie val as a 14 and 17 year old is seriously impressive. Not to mention the cookie scoping bypasses afterwards. Pretty sure at that age I was nothing more than a dumb script kiddie pressing buttons on Havij 😂
Thank you Andrew. If someone would tell me that guys in such age found a $35k bug, I would think it's maybe an IDOR, some business logic or something like that but Id never think a chain like this..
this is amazing man well explained
Holyyyy moly! This is huges! Thanks and this channel it's amazing!
You the man, i love your videos, and the time you put into them. I was always wondering when someone would, reverse engineer the bugs so we can see how they went about finding the bug, along with a proof of concept. I knew the young wipper snappers would rise up and make my job even harder, lol. I love that shirt, looks good on you. I go the gym as well, have to fill out my club shirts, hehe.
Hahah thanks for the comment!
I struggle now to find gym alternatives when they are closed but Im doing my best to keep my shirts pumped up!💪
so you understood the whole vid? you are genius, man
Crazy. I'm 14 and these guys are obviously doing some crazy stuff!
I wish you a happy journey into cyber security!
@@sontapaa11jokulainen94 Thank you, you too.
Success unlocked: pay back the bank for all school years.
wow That’s awesome,,
Good bro
😊👌
First 🥇