Similar Tracks
How to turn a write-based path traversal into a critical? - Bug bounty case study
Bug Bounty Reports Explained
GraphQL Exploitation: Secondary Context Attacks and Business Logic - Willis Vandevanter
OWASP Foundation
$6,5k + $5k HTTP Request Smuggling mass account takeover - Slack + Zomato
Bug Bounty Reports Explained
Which XSS payloads get the biggest bounties? - Case study of 174 reports
Bug Bounty Reports Explained
Exploiting Client-Side Path Traversal: CSRF Is Dead, Long Live CSRF - Maxence Schmitt
OWASP Foundation
How to get greater bounties for MEDIUM and LOW risk reports? Account takeover - Stripe
Bug Bounty Reports Explained
Top-Tier Bug Bounty Hunter Mindset - Yassine Aboukir KEYNOTE at BSides Ahmedabad 2022
BSides Ahmedabad
$20,000 RCE in GitLab via 0day in exiftool metadata processing library CVE-2021-22204
Bug Bounty Reports Explained
DEF CON 32 - Leveraging AI for Smarter Bug Bounties - Diego Jurado & Joel Niemand Sec Noguera
DEFCONConference