[Part II] Bug Bounty Hunting for IDORs and Access Control Violations

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 87

  • @HariHacks22
    @HariHacks22 8 месяцев назад +5

    Sir you can use the Firefox Multi-Account Containers extension for multiple accounts Logged in same time !

  • @rs0n_live
    @rs0n_live  10 месяцев назад +8

    Hey Everyone! Just want to give a quick update on my IDORs and Access Controls Part III video:
    As I'm recording this video, I'm realizing that this will end up being another 4-5 hour recording 😨, and as much as I want to get this video out to the community, I also don't want to rush it.
    Now that we've got the basic knowledge from the last two videos, I think I have a really great opportunity to take my time and demonstrate a very effective and cohesive methodology. Then downside is that it simply takes time to get all that knowledge in the video.
    I promise I will get this video out to y'all as soon as I can! However, I also promise not to rush out an inferior video just to keep my numbers up in the algorithm, which hopefully is better for everyone!

  • @bertrandfossung1216
    @bertrandfossung1216 11 месяцев назад +12

    I really can’t thank you enough. I may not understand everything now but I believe as I continue watching and taking notes, I will learn a lot that will improve my BB game. Thank you very much 🙏🏾

    • @MrAwesome9004
      @MrAwesome9004 11 месяцев назад +2

      Can we learn together because I also started BB but need someone to ask help or anything. If you don't mind we do bb together or atleast learn together

    • @bertrandfossung1216
      @bertrandfossung1216 11 месяцев назад

      @@MrAwesome9004 sure why not. It will be my pleasure.

    • @flintstones6728
      @flintstones6728 11 месяцев назад +1

      Let's go .any social media account or something to discussed there

    • @MrAwesome9004
      @MrAwesome9004 10 месяцев назад

      ​@@bertrandfossung1216Discord will be fine for learning and to do bb together as well

    • @MrAwesome9004
      @MrAwesome9004 10 месяцев назад +2

      Can also share your HTB or THM profile so I can send friend request

  • @lifeofgrish
    @lifeofgrish 11 месяцев назад +6

    Thanks man , yet again delivering exactly what we need , thankyou for helping the community out

  • @Alexander007A
    @Alexander007A 11 месяцев назад +3

    you got a subscription man. your content is much more amazing than other people .. its really helpful

  • @ov3r0
    @ov3r0 11 месяцев назад

    What an awesome RUclips for Bugbounty Hunter, specifically for beginners like me.
    Thanks, man.

  • @7he7hief95
    @7he7hief95 11 месяцев назад +6

    I said it before under another video. Your videos are among the few, if not the only ones, that show real BugBunty hunting. What's particularly interesting is the insight into your head and the structure of your approach.
    Keep it up, I love it... greetings from Europe and Germany in particular. 🥷

  • @technoworld9094
    @technoworld9094 11 месяцев назад +2

    I started following you around a month and your content never disappoint me..............thanks for providing fruitful content.............Lots of love from Nepal
    🥰

  • @AhmedAli-u7r2e
    @AhmedAli-u7r2e 3 месяца назад

    best video i ever seen in bug hunting

  • @geniusesml3700
    @geniusesml3700 11 месяцев назад

    we really want more videos about deep dive and logic bugs thank you

  • @harshraj5771
    @harshraj5771 5 месяцев назад

    Thank you so much for everything you have doing for us

  • @dcybershark
    @dcybershark 10 месяцев назад

    Your videos are very helpful for newbies in bug bounty, I am requesting you to please continue the video where you have put notes for SSRF AND INJECTION VULNERABILITIES possible.

  • @socialmedia-i3n
    @socialmedia-i3n 4 месяца назад

    Keep doing bro, you are doing amazing work for the community ❤.

  • @Gray3ther
    @Gray3ther 11 месяцев назад +2

    The most thorough tutorial I've come across. We can't thank you enough for giving back to the community the way you have! Quick noob question: is your framework considered "scanning" or when a company on a platform states "no automation", then does ars0n-framework fall in that category?

  • @HackAll-ue3sr
    @HackAll-ue3sr 10 месяцев назад

    waiting for part 3 thanks a lot best video on the youtube

  • @tallst1
    @tallst1 11 месяцев назад

    Thanks for the video. I will sit and watch

  • @steiner254
    @steiner254 10 месяцев назад

    Awesome

  • @hippolytnavrose5094
    @hippolytnavrose5094 11 месяцев назад +1

    Please we need videos on the OWASS Top 10 on live targets

    • @rs0n_live
      @rs0n_live  11 месяцев назад +4

      I definitely plan on going through all of them, eventually! This video serious covers No. 1 on the list, Broken Access Control :)

  • @feyibadmus
    @feyibadmus 10 месяцев назад

    At timestamp 1:45:32 You were wondering why you didnt see your graphql requests. It was because you had your requests sorted by "Method".
    Just incase you were still wondering.
    By the way, great content and i am going to watch every single livestream and i hope there is a way we can get notified about livestreams so i can always join and follow along in real time

  • @sipulke
    @sipulke 11 месяцев назад

    Amazing 🤩 exactly what I need, examples from real websites 💕

  • @1ko9
    @1ko9 10 месяцев назад

    Thank you very much. Awesome as always 🦾

  • @ahmedmouad344
    @ahmedmouad344 9 месяцев назад

    1:38:09 if we checked if introspection is enabled or not this will be a great step as well

    • @ahmedmouad344
      @ahmedmouad344 9 месяцев назад

      Also there's an amazing firefox extension that helps with opening multiple accounts called PwnFox you don't need to open multiple browsers for multiple account only 1 firefox is enough :)

  • @hades6-3-63
    @hades6-3-63 5 месяцев назад

    Love these video's. Only thing i would change is keeping the microphone a little closer to yourself, because now your keyboard is really loud for me. Keep up the good work

  • @keppubgpc
    @keppubgpc 11 месяцев назад +1

    Very good content like this a lot!
    Please continue making video's like this for csrf and xss and maybe some short vids for file uploads

  • @benjaminmunoz9136
    @benjaminmunoz9136 7 месяцев назад

    Great video rs0n! Thanks
    I would like to see how you test SSRF on that pointer, please.

  • @shrayes
    @shrayes 5 месяцев назад

    Thank you so much

  • @MFoster392
    @MFoster392 11 месяцев назад

    Thanks man, hope you and your family have a great holiday weekend :)

  • @shreerammallick5434
    @shreerammallick5434 11 месяцев назад

    Your content is really awesome love form 🇮🇳

  • @gamerz9129
    @gamerz9129 11 месяцев назад

    thank you so much i was waiting for your videos :) finally yes!

  • @YaseenKhan-s3s
    @YaseenKhan-s3s 6 месяцев назад

    Learned a lot from you a great resource which i found over the internet

  • @beratmlb
    @beratmlb 9 месяцев назад +1

    Hi mate, this is really the situation that even automatic vehicles miss. I think artificial intelligence will not be able to end a weakness like Idor, at least in the short term, because serious logic needs to be established here.

  • @dardodiesel5502
    @dardodiesel5502 11 месяцев назад

    amazing content, i learned a lot with this real world demostrations. Waiting for the injection testings if youre thinking to do it!

    • @rs0n_live
      @rs0n_live  10 месяцев назад

      I'm working on Client-Side Injection Testing right now :)

  • @de-identified
    @de-identified 11 месяцев назад

    You can isolate the sessions by using Firefox containers instead of opening a private window or a different browser

  • @Slowisdom_the_first
    @Slowisdom_the_first 13 дней назад

    Ty my man , just one question how to you find the cookie/id of tje victim in the first place to perform tje IDOR ?

  • @tkcrash9009
    @tkcrash9009 4 месяца назад

    Amazing video🔥

  • @Pachhasak
    @Pachhasak 11 месяцев назад

    finally, new video came.

  • @gosiekk13
    @gosiekk13 10 месяцев назад

    Thank you very much!

  • @BdndnJdndnx-ci1uv
    @BdndnJdndnx-ci1uv 9 месяцев назад

    Awesome content. Learn a lot.

  • @devilsworld7299
    @devilsworld7299 11 месяцев назад

    Here it comes...🔥🔥🔥

  • @evertondeoliveirasoares2406
    @evertondeoliveirasoares2406 6 дней назад

    How i choose a best program to me?
    And, can i to improve my skills at IDOR only with write up ?

  • @antonyjose2231
    @antonyjose2231 11 месяцев назад

    Thank you so much for the effort.

  • @futuremillionaire3206
    @futuremillionaire3206 10 месяцев назад

    Thank you so much sir

  • @aquatester
    @aquatester 11 месяцев назад +1

    Appreciate your hard work, GREATE VIDEO

  • @金子卓樹
    @金子卓樹 11 месяцев назад

    待ってました!

  • @z1ro_zb
    @z1ro_zb 11 месяцев назад

    i was waiting for this! thanks man

  • @abdellahbouskine5340
    @abdellahbouskine5340 3 месяца назад +1

    Thanks man you helped us a lot 🤍

  • @Alexander007A
    @Alexander007A 11 месяцев назад

    Hello sir,
    i have a full understanding concept of Idor but I did not know how i choose a target and how I can start with burp suite or Owasp Zap. did you show how to find Idor in this tutorial?

  • @rayancodes4618
    @rayancodes4618 9 месяцев назад

    Thank u man

  • @sveneFX
    @sveneFX 10 месяцев назад

    Thx!

  • @youshouldsee8240
    @youshouldsee8240 10 месяцев назад

    Really Great Contetn ♥

  • @PinkBatman566
    @PinkBatman566 6 месяцев назад

    Hey what appends if you actually find a vuln during these?

  • @Bhaveshdewasi_1
    @Bhaveshdewasi_1 11 месяцев назад

    waiting for this😀

  • @salem48097
    @salem48097 9 месяцев назад

    could you please provide free alternative to some of the functuions used in burp pro thanks alot

  • @DewamJayasooriya
    @DewamJayasooriya 11 месяцев назад +2

    U r the guy man....i think these are the only live truth bug hunting vedios..yah sure you will reach 8M as freecodecamp....🎉

  • @Nujjawal
    @Nujjawal 10 месяцев назад

    Can you share notes of this video

  • @user-ic8kv5qm2j
    @user-ic8kv5qm2j 11 месяцев назад

    el mejor!!

  • @mafiadesneakers
    @mafiadesneakers 11 месяцев назад

    Hi Richard , wasn't using burp suite prohibited in the rules ?

    • @rs0n_live
      @rs0n_live  11 месяцев назад +5

      Hey @mafiadesneakers, this is a GREAT question and something I should have addressed a bit better in the video. Thank you for asking this, I'm sure there were several others thinking the same thing!
      Pantheon does say that you are prohibited from:
      -Use of automated application scanners (OWASP Zap, Burp Suite) in attack mode.
      This means that any type of Active Scanning is not allowed against their application. The reason for this is the organization is concerned about downtime if an injection attack, or just the volume of requests, became to much for their servers. However, using Burpsuite to manage your sitemap, send requests w/ Repeater, etc. is 100% fine.
      They also say you are prohibited from:
      -Exceeding a rate limit of 1 request per second for all scripted / API tests.
      This is the reason I made sure to mention the "Low and Slow" resource pool a few times, including how to set it up.
      As long as you are not sending more than 1 request a second, and you are not performing active scanning, you are good to go!

  • @bugbouty
    @bugbouty 11 месяцев назад

    we wanna your methodology video 🖐

  • @anurag.30302
    @anurag.30302 11 месяцев назад

    why don't you use autorize burp extension

  • @gamersworld98
    @gamersworld98 10 месяцев назад

    But in the end you are not find the vulnerability? …you just conveyed if a developer or team member become yes ..then there is a vulnerability…this very basic to know
    We have part 3 ?

  • @siddharthanand5056
    @siddharthanand5056 10 месяцев назад

    its january..part 3 bro?

    • @rs0n_live
      @rs0n_live  10 месяцев назад

      The community overwhelmingly requested me to do the Client-Side Injections video before Part 3 so I shuffled a few things around. Part 3 of this series should be out in the next week or two!

  • @5crypt
    @5crypt 11 месяцев назад

    01:27:43 WTF Man, what is that FBI thing

  • @bugbouty
    @bugbouty 11 месяцев назад

    hey harrison make videos some faster man

  • @kunshtanwar4765
    @kunshtanwar4765 11 месяцев назад

    Thanks rs0n, Also can you please link your discord 😊

    • @rs0n_live
      @rs0n_live  11 месяцев назад

      Is it not showing at the bottom of the Description?
      I'll post it here, as well: discord.gg/AuruXMXJKA