OWASP API Top 10 - Broken Authentication

Поделиться
HTML-код
  • Опубликовано: 24 дек 2024

Комментарии • 17

  • @bertrandfossung1216
    @bertrandfossung1216 5 месяцев назад +2

    Médusa you’re just the best. Your explanations of complex processes are second to none. Please keep up with this series. This is a real gem 💎

    • @Medusa0xf
      @Medusa0xf  4 месяца назад

      Means a lot 💚

  • @abdullahjaved2371
    @abdullahjaved2371 4 месяца назад +1

    The time it'd have taken to edit this, goddamn. Keep up the content meds.

  • @bughunter9072
    @bughunter9072 28 дней назад

    Wow ❤nice explanation

  • @amoh96
    @amoh96 4 месяца назад

    i really like this type of video really cool keep it like this simple and give us examples thank u

  • @crueljed1
    @crueljed1 4 месяца назад

    Nice explanation ❤

  • @jxkz7
    @jxkz7 4 месяца назад

    Great content ❤

  • @IBO.ATTACKS
    @IBO.ATTACKS 4 месяца назад +1

    شكرا؟ = thanks
    🤩

  • @thechannelofmine
    @thechannelofmine 4 месяца назад +1

    The second report is closed as informative that means it's not a valid bug. for this to be impactful the attacker has to redirect the user to his malicious page than steal those tokens using the Referer header from the victim request.

    • @Medusa0xf
      @Medusa0xf  4 месяца назад

      that's another case in itself 😄

    • @thechannelofmine
      @thechannelofmine 4 месяца назад

      @@Medusa0xf If you take a look again at the report you will see that it's closed as informative that means it's not a vulnerability, as he didn't show a real exploit senario, and it's not vulnerable to man-in-the-middle attack because it's secured as https method.
      Btw are you active on hackerone?

  • @arjuna902-
    @arjuna902- 4 месяца назад

    i love your voice