Dailycodinghabit

1.8K posts

Dailycodinghabit banner
Dailycodinghabit

Dailycodinghabit

@Dailycodinghab1

Oliver | Developer | 🇩🇪 #dailycodinghabit You daily coding lesson Python | C++ | PHP | Javascript | Swift | C | C# | Golang...

加入时间 Ocak 2021
2.7K 关注1.3K 粉丝
Dailycodinghabit 已转推
Proviesec
Proviesec@proviesec·
#BugBounty Tip: Test for IDOR by changing parameter values like user IDs in URLs (/profile?id=123). Accessing different profiles? You’ve found a vulnerability. It’s a simple but effective way to uncover sensitive data exposures! #WebSecurity #BugBountyTips #CyberSecurity
English
0
1
3
203
Dailycodinghabit 已转推
Proviesec
Proviesec@proviesec·
#BugBounty Tip of the Week: Don't forget about API endpoints! Regularly scan for exposed endpoints and try sending unexpected data types in API calls (e.g., pass an object where a string is expected). Always validate and sanitize inputs rigorously. #APIsecurity #cybersecurity
English
0
1
5
150
Dailycodinghabit 已转推
Proviesec
Proviesec@proviesec·
#BugBounty Tip of the week: Resource: Check out tinyxss.terjanq.me for a collection of concise XSS payloads tailored for various contexts. Perfect for testing environments with specific feature allowances Enhance your XSS testing strategy! #CyberSecurity #XSS
English
0
1
5
206
Dailycodinghabit 已转推
Proviesec
Proviesec@proviesec·
#BugBounty Tip of the week: Test Header Injection via User-Agent! Try injecting `User-Agent: myapp\r\nInjected-Header: value` to see if the server splits the response. Successful exploitation could lead to cache poisoning or XSS attacks. #Bugbountytipp #cybersecurity
English
0
1
4
221
Dailycodinghabit 已转推
Proviesec
Proviesec@proviesec·
#BugBounty Tip of the week: Expose Business Logic Flaws! Test unexpected workflows, like repeatedly using 'forgot password' or manipulating shopping cart values. These actions can reveal overlooked vulnerabilities that automated scanners miss. #BusinessLogic #CyberSecurity
English
0
1
6
198
Dailycodinghabit 已转推
Proviesec
Proviesec@proviesec·
🚀 #BugBounty Tip of the Week: Master Time-Based Blind SQLi! Use: 1' AND SLEEP(5)-- in inputs. Response delay indicates a vulnerability, crucial for apps without clear error messages. Uncover stealthy SQLi! #SQLInjection #CyberSecurity #bugbountytips
English
0
2
6
359
Dailycodinghabit 已转推
Proviesec
Proviesec@proviesec·
Dive deeper into XSS vulnerability testing with complex polyglots: <svg/onload=alert(1)><script>alert\1`</script><img src=x onerror=alert(2) />` in various input fields to see if the app executes the script #BugBounty #bugbountytips #CyberSecurity
English
0
2
10
774