Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Hunting Bugs In Real Life
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
akshat singhal
September 23, 2020
Technology
0
100
Hunting Bugs In Real Life
akshat singhal
September 23, 2020
Tweet
Share
Other Decks in Technology
See All in Technology
セキュリティ はじめの一歩
nikinusu
0
1.5k
Digitization部 紹介資料
sansan33
PRO
1
6.8k
制約が導く迷わない設計 〜 信頼性と運用性を両立するマイナンバー管理システムの実践 〜
bwkw
2
830
日本語テキストと音楽の対照学習の技術とその応用
lycorptech_jp
PRO
1
410
GSIが複数キー対応したことで、俺達はいったい何が嬉しいのか?
smt7174
3
130
データの整合性を保ちたいだけなんだ
shoheimitani
7
2.7k
Agile Leadership Summit Keynote 2026
m_seki
1
260
顧客の言葉を、そのまま信じない勇気
yamatai1212
1
320
Bill One 開発エンジニア 紹介資料
sansan33
PRO
4
17k
Mosaic AI Gatewayでコーディングエージェントを配るための運用Tips / JEDAI 2026 新春 Meetup! AIコーディング特集
genda
0
150
仕様書駆動AI開発の実践: Issue→Skill→PRテンプレで 再現性を作る
knishioka
2
560
今日から始めるAmazon Bedrock AgentCore
har1101
4
380
Featured
See All Featured
Designing for Performance
lara
610
70k
CoffeeScript is Beautiful & I Never Want to Write Plain JavaScript Again
sstephenson
162
16k
Breaking role norms: Why Content Design is so much more than writing copy - Taylor Woolridge
uxyall
0
160
Accessibility Awareness
sabderemane
0
47
How To Speak Unicorn (iThemes Webinar)
marktimemedia
1
370
The World Runs on Bad Software
bkeepers
PRO
72
12k
Speed Design
sergeychernyshev
33
1.5k
How Fast Is Fast Enough? [PerfNow 2025]
tammyeverts
3
450
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
31
3.1k
Visualizing Your Data: Incorporating Mongo into Loggly Infrastructure
mongodb
49
9.8k
The Spectacular Lies of Maps
axbom
PRO
1
510
Measuring & Analyzing Core Web Vitals
bluesmoon
9
750
Transcript
None
BUG BOUNTY WEBINAR
HUNTING BUGS IN REAL LIFE Akshat Singhal
Who am I • Bug crowd Top 700 Researcher –
All Time • Blogger • Bug Bounty Hunter • Speaker • Lifelong learner
@Akshat05623019 @akshat-singhal-90141716b @honeyakshat999 Get In Touch At @AkshatSinghal1 @AkshatSinghal @honeyakshat999
None
None
None
STORED DOM REFLECTED
None
None
SQL injection is a web security vulnerability that allows an
attacker to interfere with the queries that an application makes to its database.
▪ admin’—
None
None
TYPES HORIZONTAL VERTICAL
None
None
None
CSRF + XSS --> Account Takeover User enum.
+ IDOR --> All users compromise
None
None