IDOR - how to predict an identifier? Bug bounty case study

Поделиться
HTML-код
  • Опубликовано: 28 ноя 2024
  • НаукаНаука

Комментарии • 30

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  Год назад +4

    Welcome to the comment section. If you don't want to miss my future case studies, join BBRE Newsletter for free at bbre.dev/nl

  • @moizpasha7852
    @moizpasha7852 Год назад +4

    Great vid! One of the weirdest IDORs I found used a UNIX epoch timestamp format as an identifier. I spent a lot of time bruteforcing it, but since I was only changing the time by a matter of milliseconds (I did not know what a UNIX timestamp was) I did not get to exploit it. Reported it anyway and got informed that it was a P1.

  • @normalitee0os
    @normalitee0os Год назад +2

    Your channel is just absolute gold man!

  • @eyezikandexploits
    @eyezikandexploits Год назад

    Veen heavy in idor lately this video was nice and perfect timing

  • @AbdAlkarimTube
    @AbdAlkarimTube Год назад +2

    Nice topic! We need more on BAC. Thanks!

  • @musaumarfaruq8675
    @musaumarfaruq8675 Год назад

    Where can I find all the bug reports

  • @guillermoslomon6738
    @guillermoslomon6738 Год назад

    I really like the way you explain it, thank you

  • @monKeman495
    @monKeman495 Год назад +1

    Much appreciated detailed case study of IDOR bug class can we expect your 20k aws misconfiguration vid next ?

  • @andrezaantonelli5024
    @andrezaantonelli5024 Год назад

    Thank you so much for your help and your time.

  • @duskb1t
    @duskb1t Год назад

    I really enjoy your content. You have a new active sub

  • @32_jadav_akash22
    @32_jadav_akash22 Год назад

    If the identifier is long or uuid it could be found on the Wayback machine it is still a valid report??

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  Год назад

      rez0 has a great blogpost about the topic: rez0.blog/hacking/cybersecurity/2022/08/18/unpredictable-idors.html

  • @CristiVladZ
    @CristiVladZ Год назад

    I love these case studies!

  • @GajendraMahat
    @GajendraMahat 11 месяцев назад

    which website he is using to view all the writeup

  • @johnnyonpc6799
    @johnnyonpc6799 Год назад

    Just found your channel, very good content I'd say. Keep it up! Subbed.

  • @M7moudx22
    @M7moudx22 Год назад

    it's possbile to upload write-ups file ?

  • @sxhil.d3v
    @sxhil.d3v Год назад

    can u share all reports coz i just started idk much idors

  • @EndlessTech
    @EndlessTech Год назад +1

    According to you how many people in world are there in Penetration testing and ethical hacking in cybersecurity like range or gesture for example 4-5 million, etc.

  • @leghdaf
    @leghdaf 3 месяца назад

    Great Content ...

  • @ahmetsaric5364
    @ahmetsaric5364 9 месяцев назад

    Thank you

  • @grassy-p12
    @grassy-p12 Год назад

    Yeah its so informative😍

  • @MFoster392
    @MFoster392 Год назад

    Gret video thanks

  • @bibekdhakal3887
    @bibekdhakal3887 Год назад

    😁😁