@@BugBountyReportsExplained yes i have.i see many cve reports in hackerone hacktivity.but when i search that particular cve on internet i cant find any result.where can i find the poc of those cve's??
Finally got round to watching this! Great job as always! :) Not gonna lie I had no idea about being able to interact with frames hosted on windows of different origins! Will definitely keep that in mind for the future. Explained fantastically as always thanks!
Hey great video. I dont get how it was possible to acheive two csrf with the user clicking one link? Every time I try this only one request goes threw and the page changes
You can also now use the Thanks feature if you like these videos😏
@@trtrhr Intigriti. Bug bounty Platform if you such kind of knowledge you can start hunting.
The truth is I only understood half of what you said but one day i hope to understand all this better
Yeah, this bug is quite complex. Do you have any particular questions?
@@BugBountyReportsExplained yes i have.i see many cve reports in hackerone hacktivity.but when i search that particular cve on internet i cant find any result.where can i find the poc of those cve's??
@@itsm3dud39 90% of CVE's don't have a PoC for the exploit, just shows that it had an exploit and might say what type it was
@@eyephpmyadmin6988 👍
Yeah true that's why you should be able to build poc or just buy them for 1day exploit
Finally got round to watching this! Great job as always! :) Not gonna lie I had no idea about being able to interact with frames hosted on windows of different origins! Will definitely keep that in mind for the future. Explained fantastically as always thanks!
Wow that's creativity...
The way he exploited the bug was so beautiful but ofc explanation was good too...
Keep posting more!
Keep covering this subject bro. I need more.
Read up on dirty dancing attacks if you think oauth stuff is cool :)
Very nice and your way of explanation is more than wonderful. I hope you will explain more videos of Youssef Samouda and thank you very much
Thanks! Youssef is a beast!
Great video as always
Hey great video. I dont get how it was possible to acheive two csrf with the user clicking one link? Every time I try this only one request goes threw and the page changes
Mind blowing!
Great video. Why don't you cover the recent oauth research by fransrosen?
I covered it in BBRE Premium two weeks ago. The idea behind the attack is very similar, just the method of leaking the URL is different.
Great content
Good job bro
'Ennnjoy!' 🤣 I definitely do, my friend!
he knows alot about the facebook features and sub sites. very interesting.
True, comminting to one program pays off for him well.
From where did you learn bug bounty
from Bug Bounty Reports Explained channel on RUclips 😏
Oh wow , can I get his number
I have seceret to tell him....😉😉
@@BugBountyReportsExplained and the guy who makes the videos learned it from you? 🤔😄
To understand recursion, you must first understand recursion
Congratulations 🎉🎉 , confusion is successfully installed into the brains
Thanks you bro
HMMM , CSRF IN FACEBOOK ...... how tho ???
CSRFs on login and logout are often considered too low impact for a bug bounty report so I'm not that amazed.
Hey If you don't mind can you give me model number of your Logitech mouse?😅
It's G403
Bro apk to jpg exploit and Android hack possible?
send me links to these writeups via Twitter and I'll see what I can do
@@BugBountyReportsExplained ruclips.net/video/pvmx7PKIk_c/видео.html
creativity
Please show actual hacking u have done
check out the bounty vlog playlist