Logan Sec

262 posts

Logan Sec banner
Logan Sec

Logan Sec

@LoganOpSec

⚡️ Breaking apps, building tools, sharing the journey 🔑 Bug bounty | Web security | Ethical hacking 🎯 Aiming for a pentesting job by 2026

Katılım Eylül 2025
21 Takip Edilen48 Takipçiler
Sabitlenmiş Tweet
Logan Sec
Logan Sec@LoganOpSec·
Hey #infosec 👋 I’m Logan, an aspiring penetration tester & bug bounty hunter. I’ll be sharing my journey, tools I build, and lessons I learn along the way. 🎯 Goal: Land a pentesting job by 2026. Follow along 🚀 #BugBounty #PenTest
English
0
0
3
956
Logan Sec
Logan Sec@LoganOpSec·
@vuln_X This is exactly why IDOR testing shouldn’t stop at user_id=123. Test nested objects, arrays, duplicated keys, JSON type changes, and places where auth checks one value but the backend logic later trusts another. That mismatch is where the real bugs show up.
English
1
0
1
137
vulnX
vulnX@vuln_X·
Bug Bounty tip 🧵 Don't just swap IDs — wrap them. ❌ {"Account": 1111} ✅ {"Account": {"Account": 3333}} Auth validates the outer key. Business logic executes the inner one. Scanners miss it. You won't. #BugBounty #IDOR #APIHacking
English
2
32
182
5.1K
Logan Sec
Logan Sec@LoganOpSec·
Most bug bounty hunters don’t quit because they’re dumb. They quit because they hunt alone, get buried in duplicates/informatives, and have nobody to help them figure out what’s signal vs noise. That’s the part people don’t talk about enough. #bugbounty
English
0
0
1
38
HackenProof
HackenProof@HackenProof·
@LoganOpSec At some point the tab has to close and the hunt has to start 😄
English
1
0
1
19
Logan Sec
Logan Sec@LoganOpSec·
@gabbytech01 Appreciate it. Business logic is the category where “understanding the app” matters more than memorizing payloads. That’s also why I think AI helps, but doesn’t replace the manual reasoning side.
English
1
0
1
118
Gabriel Odusanya • WoTxOSec
Bug bounty hunters and Security Researchers, we will like to know, what is the hardest bug to find in a web application ?
English
12
3
89
9.9K
Logan Sec
Logan Sec@LoganOpSec·
@teryanarmenn AI massively increases the odds of finding a bug, but defense still has to deal with the brutal part: coverage. Attackers only need one missed edge case. Defenders have to reason through the whole system, the assumptions between components, and the weird business logic.
English
0
0
0
16
Armen
Armen@teryanarmenn·
Here's what's happening with AI and security. Basically, AI makes it much easier to find a single bug in any given code base, 10-100x easier. It makes any given engineer ten times better at hacking, if not more. What it doesn't do is make it easier to find every single bug. There are still a few bugs that require manual work. The manual work takes a similar amount of time as it did before AI. Maybe you get a 10% to 20% efficiency gain, but not more. Now you got these people that realize, "Hey, AI has made me ten to a hundred times better at hacking." Why should security work take the same amount of time? Shouldn't it be half the time, 10% of the time? The reality is that you need a similar amount of time as pre-AI, because a researcher’s job is not to find one bug, it’s to find every single bug. That just takes the same amount of work as before. We don't have a system to find every single bug yet. So now we're in the most vulnerable time, since preventing a hack requires you to find every single bug. Hacking requires you to find one bug. Prevention has stayed the same difficulty, while hacking has gotten 10 to 100x easier. That's why all these protocols are getting hacked. Security is hard right now. It's the hardest it's ever been.
English
6
11
59
3K
Logan Sec
Logan Sec@LoganOpSec·
@rez0__ I disagree with you, people should agree with everything you say; like I do!
English
0
0
1
239
Joseph Thacker
Joseph Thacker@rez0__·
When it comes to my tweets and also the pod, my goal is to bring you the truth and my opinion on things that are true. People dont have to agree with me. And that doesn’t offend me. Discourse is good. That is all.
English
9
1
85
4.8K
Logan Sec
Logan Sec@LoganOpSec·
@Jalwan0x1 @Bugcrowd Congrats, can you walk me through how you found this Blind Stored XSS? I've been more heavily focusing on Client-Side Bugs recently.
English
1
0
0
98
Logan Sec
Logan Sec@LoganOpSec·
@0xOmeiza @intigriti I do have a YouTube channel called LoganSec. I've never promoted it on X before tho.
English
0
0
0
18
Intigriti
Intigriti@intigriti·
🔁 Business logic vulnerabilities remain one of the most overlooked attack vectors! 🧐 Unlike most injection vulnerabilities that can be automated, logic flaws emerge from the gap between how developers expect systems to behave and how attackers can manipulate them! 🤠 Our comprehensive guide covers identifying and exploiting logic errors that can lead to broken access controls, injection attacks, and cryptographic bypasses! 😎 Read the full article today👇 intigriti.com/researchers/bl…
Intigriti tweet media
English
2
5
82
4.4K
Logan Sec
Logan Sec@LoganOpSec·
@payloadartist The only and best alternative is just recon scripts + manual hacking
English
0
0
1
319
payloadartist
payloadartist@payloadartist·
What's the next best alternative to Claude for hard core hacking?
English
13
0
25
7K
Logan Sec
Logan Sec@LoganOpSec·
Been going deeper into JS recon. Not just dumping endpoints. Reading the JS to understand routes, API paths, feature flags, role checks, and client-side validation. JS recon shows how the app thinks. Automation extracts. Manual logic finds bugs. #bugbounty #bugbountytips
English
0
0
1
152
Logan Sec
Logan Sec@LoganOpSec·
@Itx_Shad0w Usually when I start hunting on a new target. The only real plan is to understand the app and take notes. After that I add more structure.
English
0
0
1
119
Shad0w
Shad0w@Itx_Shad0w·
No methodology No Strategy Just raw hunting.
English
4
4
64
1.8K
Logan Sec
Logan Sec@LoganOpSec·
@cvetanovv0 Biggest thing I’d add: don’t just “learn security” in theory. Pick real targets/labs, take notes, write reports, and build pattern recognition through reps. That’s where the skill actually starts compounding.
English
0
0
3
180
Dimitar Tsvetanov
Dimitar Tsvetanov@cvetanovv0·
A lot of people ask me how to become a Security Researcher. Here are 4 steps you can take 👇
English
12
5
77
5K
Logan Sec
Logan Sec@LoganOpSec·
I reported a bug 2 days ago, result? It was a Dup, a hunter reported 2 minutes before me 😭 That is actually so funny. #bugbounty
English
0
0
0
85
HackenProof
HackenProof@HackenProof·
Continue the sentence: Bug Bounty isn't just a job, it's…
English
24
1
56
4.1K
Logan Sec
Logan Sec@LoganOpSec·
@Joyerz5 Me, manual hunting has become underrated lol. I had my super ai phase.
English
0
0
7
802
🔍mrro0o0tt
🔍mrro0o0tt@Joyerz5·
Who is hacking manually still?
English
52
4
164
19.2K
Damians1.x
Damians1.x@DamianS1·
@intigriti Take your time and log every byte—meticulous notes are a hunter's best friend. Don't let a 403 Forbidden dampen your spirits; stay locked in on your values and keep your hat as white as your terminal background. Ethics aren't just a suggestion—they're the code you live by!
English
2
0
4
1K
Intigriti
Intigriti@intigriti·
Top hackers! Share 1 #bugbountytip with your fellow bug bounty beginners to help them submit more valid reports. Go! 👇
English
11
5
96
19.5K