Bug Bounty Hunting for Server-Side Request Forgery - Who, What, When, Where, How, and Why?

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • As requested by ‪@abdonito8254‬!
    Notes and example code: github.com/R-s...
    Questions:
    WHY are you executing the attack?
    WHO is the victim?
    WHAT Technology are you exploiting?
    WHEN will you execute the attack?
    WHERE can I execute the attack?
    HOW will you deliver the payload?
    Follow along with my methodology here: ars0nsecurity....
    Hire Me! - ars0nsecurity.com
    Watch Live! - / rs0n_live
    Free Tools! - github.com/R-s0n
    Connect! - / harrison-richardson-ci...

Комментарии • 26

  • @harshil.
    @harshil. 11 месяцев назад +1

    really enjoying this series, glad to see you uploading again.

    • @rs0n_live
      @rs0n_live  11 месяцев назад +1

      I'm so glad it's helpful! I had to get some ducks in a row with the methodology and framework, but there shouldn't be any major gaps in the future!

  • @user-ck8oo1of3p
    @user-ck8oo1of3p 11 месяцев назад

    Aced it again brother no one explains it like you excellent thank you

  • @steiner254
    @steiner254 7 месяцев назад

    Awesome

  • @user-fk3jc4jm8s
    @user-fk3jc4jm8s 11 месяцев назад

    Sir you are just one of the most awesome hackers out there ❤

    • @rs0n_live
      @rs0n_live  11 месяцев назад +1

      Haha, thank you so much for the kind words but I promise that is not true. I actually run a Blue Team and I'm a very "Middle of the road" penetration tester, especially outside of web-based vulns.
      But, what I do have is a good wealth of knowledge in both Red Teaming and Blue Teaming, as well as a *very* strong foundational knowledge of the technology itself. I really think that is the key, you can't have one without the other, and you need to start with a strong understanding of the technology.

    • @user-fk3jc4jm8s
      @user-fk3jc4jm8s 11 месяцев назад

      Ofcourse Sir , you can't have one without the other@@rs0n_live

  • @abdonito8254
    @abdonito8254 11 месяцев назад

    Damnn 🎉 thank you so much for accept my request ❤

    • @rs0n_live
      @rs0n_live  11 месяцев назад

      No problem! I do these with my team, all the time, so they are easy to make. Hope it helps!!

  • @KH-en1yr
    @KH-en1yr 5 месяцев назад

    Authentication Vulnerabilities

  • @user-fk3jc4jm8s
    @user-fk3jc4jm8s 11 месяцев назад

    Can you please teach us every aspect of broken authentication and session management? 😄

    • @rs0n_live
      @rs0n_live  11 месяцев назад +1

      I'll do my best, haha! Obviously anything under creative testing becomes very contextual to the application and specific use-case, but there are certainly a ton of general rules we can go over!

  • @rafbomber7151
    @rafbomber7151 11 месяцев назад

    I see you have some source code linked too; would you have any tips tricks or even resources on how to get better at that?

    • @rs0n_live
      @rs0n_live  11 месяцев назад

      Do you mean for finding vulnerabilities in source code, similar to the OSWE methodology or doing CVE research?

    • @rafbomber7151
      @rafbomber7151 11 месяцев назад

      @@rs0n_live finding vulnerabilities in source code is something I’m trying to get better at so if you have any insight on that would be appreciated. I don’t have much of a developer background I primarily do black box testing

  • @HackAll-ue3sr
    @HackAll-ue3sr 11 месяцев назад

    Sql Vulnerability please

    • @rs0n_live
      @rs0n_live  11 месяцев назад +1

      I've gotten that request a few times. That will be my next Questions Exercise question I do!

  • @bugbountybrigade
    @bugbountybrigade 11 месяцев назад

    please make it on SQLI in details please +

    • @rs0n_live
      @rs0n_live  11 месяцев назад

      Sure, that one should be easy. I think I could do one for all database injections since the should have the same answers...
      It's on the list! (and I'll include a practical example 😉)

    • @bugbountybrigade
      @bugbountybrigade 11 месяцев назад

      Thanks waiting for your video @@rs0n_live

  • @bugbountybrigade
    @bugbountybrigade 11 месяцев назад

    try to give it in a practical example too

    • @rs0n_live
      @rs0n_live  11 месяцев назад

      Sure, I can definitely do that! Thank you for the feedback 🙏

    • @bugbountybrigade
      @bugbountybrigade 11 месяцев назад

      looking forward for your video cheers!!@@rs0n_live

  • @DayanandhanSubramani
    @DayanandhanSubramani 11 месяцев назад

    do you have discord ???

    • @rs0n_live
      @rs0n_live  11 месяцев назад

      Not an official one yet. I'm playing around with the idea. Moderating would be tough, I'm already stretched so thin.

    • @DayanandhanSubramani
      @DayanandhanSubramani 11 месяцев назад

      @@rs0n_live and Next Twitch or youtube stream on ?