Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Hunting Bugs In Real Life
Search
akshat singhal
September 23, 2020
Technology
0
92
Hunting Bugs In Real Life
akshat singhal
September 23, 2020
Tweet
Share
Other Decks in Technology
See All in Technology
経理出身PdMがAIプロダクト開発を_ハンズオンで学んだ話.pdf
shunsukenarita
1
300
AI によるドキュメント処理を加速するためのOCR 結果の永続化と再利用戦略
tomoaki25
0
340
Kiroから考える AIコーディングツールの潮流
s4yuba
4
610
【CEDEC2025】LLMを活用したゲーム開発支援と、生成AIの利活用を進める組織的な取り組み
cygames
PRO
1
2.4k
Gemini in Android Studio - Google I/O Bangkok '25
akexorcist
0
170
相互運用可能な学修歴クレデンシャルに向けた標準技術と国際動向
fujie
0
190
Strands Agents & Bedrock AgentCoreを1分でおさらい
minorun365
PRO
6
170
ソフトウェア開発プロジェクトでの品質管理への提案(温故知新)
yohwada
0
100
AWS表彰プログラムとキャリアについて
naoki_0531
1
150
2025新卒研修・HTML/CSS #弁護士ドットコム
bengo4com
3
13k
人に寄り添うAIエージェントとアーキテクチャ #BetAIDay
layerx
PRO
8
1.8k
Perlアプリケーションで トレースを実装するまでの 工夫と苦労話
masayoshi
1
380
Featured
See All Featured
KATA
mclloyd
31
14k
For a Future-Friendly Web
brad_frost
179
9.9k
Templates, Plugins, & Blocks: Oh My! Creating the theme that thinks of everything
marktimemedia
31
2.4k
Being A Developer After 40
akosma
90
590k
The Cult of Friendly URLs
andyhume
79
6.5k
Chrome DevTools: State of the Union 2024 - Debugging React & Beyond
addyosmani
7
780
How GitHub (no longer) Works
holman
314
140k
Designing Experiences People Love
moore
142
24k
Mobile First: as difficult as doing things right
swwweet
223
9.8k
ピンチをチャンスに:未来をつくるプロダクトロードマップ #pmconf2020
aki_iinuma
126
53k
Embracing the Ebb and Flow
colly
86
4.8k
Sharpening the Axe: The Primacy of Toolmaking
bcantrill
44
2.4k
Transcript
None
BUG BOUNTY WEBINAR
HUNTING BUGS IN REAL LIFE Akshat Singhal
Who am I • Bug crowd Top 700 Researcher –
All Time • Blogger • Bug Bounty Hunter • Speaker • Lifelong learner
@Akshat05623019 @akshat-singhal-90141716b @honeyakshat999 Get In Touch At @AkshatSinghal1 @AkshatSinghal @honeyakshat999
None
None
None
STORED DOM REFLECTED
None
None
SQL injection is a web security vulnerability that allows an
attacker to interfere with the queries that an application makes to its database.
▪ admin’—
None
None
TYPES HORIZONTAL VERTICAL
None
None
None
CSRF + XSS --> Account Takeover User enum.
+ IDOR --> All users compromise
None
None