Hacking a new web application from start to finish

Hacking a new web application from start to finish

Hello ethical hackers and bug bounty hunters! I’ve recently conducted a successful penetration testing against a web application built using Google Web Toolkit, and I want to share with you the process I followed and the bugs I found. Hopefully, this episode will inspire you to try harder during your own bug bounty hunting and penetration testing journey.

I will briefly explain what Google Web Toolkit is and what research has already been made around it. Then, I will explain why and how I built a Burp extension to help me during the penetration testing process. Finally, I will share with you some vulnerabilities I found, especially a cool one which required further effort. So stay with me as we smash this web application into pieces!


Read more details on https://thehackerish.com/hacking-a-google-web-toolkit-application/

Watch the Broken Access Control approach on https://youtu.be/TJQpOrtet8E

Read about IDOR on https://thehackerish.com/idor-explained-owasp-top-10-vulnerabilities/

Episoder(11)

Certified Red Team Operator Review

Certified Red Team Operator Review

In this episode, I will give you my honest review of CRTO (certified red team operator certification) from Zeropoint Security. Download your FREE Web hacking LAB: https://thehackerish.com/owasp-top-1...

29 Des 202111min

JavaScript Enumeration for bug bounty hunters

JavaScript Enumeration for bug bounty hunters

JavaScript Enumeration is a critical skill to have if you want to level up your penetration testing or bug bounty hunting game. Yet, not everyone does it, partly because it is a boring exercise or i...

24 Des 202010min

OSCP Certification: All you need to know

OSCP Certification: All you need to know

Hello ethical hackers! In this episode, you will learn everything related to OSCP certification. What is OSCP? Why is it a strong certification? What sets it apart? What are the requirements? How to...

30 Jul 202014min

From a lame SSRF to a full $4000 RCE

From a lame SSRF to a full $4000 RCE

Hello ethical hackers and bug bounty hunters! Welcome to this bug bounty write-up where I show you how I found a Server-Side Request Forgery vulnerability (SSRF). Then, I will explain how I was able...

5 Jul 20209min

Bug bounty tools you should start using!

Bug bounty tools you should start using!

Hello ethical hackers and welcome to the world of hacking and bug bounty hunting. Today, I will share the tools I use to gather open source intelligence and perform subdomain enumeration. Every crafts...

27 Mai 202013min

This is how you write bug bounty reports that stand out!

This is how you write bug bounty reports that stand out!

Hello dear ethical hackers and welcome to this new article about bug bounty hunting. In this episode, you will discover my report template and learn how you can write outstanding bug bounty reports wh...

7 Mai 202015min

My bug bounty methodology and how I approach a target for the first time

My bug bounty methodology and how I approach a target for the first time

Welcome again to the Hack for Fun and Profit podcast, where we explore topics related to cyber security and bug bounty hunting. Last time, I showed you the best resources I use to stay up to date in b...

30 Apr 202018min

Populært innen Fakta

fastlegen
dine-penger-pengeradet
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
treningspodden
rss-strid-de-norske-borgerkrigene
foreldreradet
jakt-og-fiskepodden
rss-sunn-okonomi
hverdagspsyken
sinnsyn
merry-quizmas
gravid-uke-for-uke
rss-kunsten-a-leve
tomprat-med-gunnar-tjomlid
smart-forklart
fryktlos
rss-impressions-2
rss-kull
rss-mann-i-krise-med-sagen
hagespiren-podcast