Hi everyone, Please make sure to register using your actual email address for the event otherwise you'll get removed.
Thank you!!!
Thank you!!!
❤1👍1
Have you ever struggled with rate limits during content discovery? Here's how to break through without slowing down.
I just released a video where I walk you through a step-by-step guide on bypassing rate limits using IP rotation through Tor. Whether you're diving into bug bounties, ethical hacking, or just honing your content discovery skills, knowing how to handle rate limits can make a huge difference. In the video, I explain how to use Tor to rotate IPs efficiently so you can keep your exploration seamless and uninterrupted.
If you're looking for actionable techniques that actually work, this video is for you. Check it out and take your content discovery skills to the next level.
Video Link: https://www.youtube.com/watch?v=lbpFBYTpyPg
Let me know your thoughts or if this approach has been helpful to you.
I just released a video where I walk you through a step-by-step guide on bypassing rate limits using IP rotation through Tor. Whether you're diving into bug bounties, ethical hacking, or just honing your content discovery skills, knowing how to handle rate limits can make a huge difference. In the video, I explain how to use Tor to rotate IPs efficiently so you can keep your exploration seamless and uninterrupted.
If you're looking for actionable techniques that actually work, this video is for you. Check it out and take your content discovery skills to the next level.
Video Link: https://www.youtube.com/watch?v=lbpFBYTpyPg
Let me know your thoughts or if this approach has been helpful to you.
YouTube
The Secret to Content Discovery: Bypassing Rate Limits Like a Pro! | 2024
Want to level up your content discovery game? In this video, I'll show you how to bypass rate limits like a pro using IP rotation through Tor! Rate limits can be frustrating, but with the right approach, you can keep your exploration going without interruptions.…
🔥12❤5👍3
In one of my recent pentest, I was able to hack their zimbra webserver which is used to handle their emails. Once logged in, I was able to read all their private emails, get organization details and lot of other sensitive data!
Here's how i did that:
1. Their main application was created on angular. So by reading the source code, I identified some internal api endpoints.
2. Upon sending the request to these api endpoints, I was able to grab the credentials for webserver.
3. Enumerated all subdomains to find their mailing server and tested the creds
4. Got access to the portal!!!! (Sample picture attached for reference)
Tip: Always keep a close look at the source code, You might find something juicy there😉
Here's how i did that:
1. Their main application was created on angular. So by reading the source code, I identified some internal api endpoints.
2. Upon sending the request to these api endpoints, I was able to grab the credentials for webserver.
3. Enumerated all subdomains to find their mailing server and tested the creds
4. Got access to the portal!!!! (Sample picture attached for reference)
Tip: Always keep a close look at the source code, You might find something juicy there😉
🔥27👍12
Join with this link: https://lab.securzy.io/c/securzy-events/bug-bounty-all-about-ssrf
Securzy Lab
Bug Bounty: All About SSRF by Faiyaz | Securzy Lab
This webinar will cover everything related to ssrf with live demos, poc and will demonstrate how to effectively find ssrf in the real world using AI.
👍9❤2
Hi everyone, I hope you enjoyed the session! Once again, Thank you so much for the love and support💪
❤12
Regarding recording, Unfortunately, I don't think you will be able to get it unless you are a pro member on Securzy
👎10❤7😢1🐳1🖕1
BePractical
Note: The recordings on this webinar could be paid so it will be best if you all can watch live!
We have already posted about it to aware you all that you may not get the recording for free. However, Given the love and support by you all, We will definitely plan to launch another session soon in the near future!
👍18😢1
This media is not supported in your browser
VIEW IN TELEGRAM
Hi Everyone! Apologies for the delays in video uploads. I am actually at my hometown and been really busy because of some personal reason. But finally got some time to work on a new video and trust me, You will definitely like it!!! It will be very useful when you are hacking modern apps developed in node, python etc
Keep learning & Keep Hacking!
Keep learning & Keep Hacking!
❤🔥20❤7👍4🔥3🐳1
How Dependency Confusion Exposed Millions: The Hack Every Developer Should Know
Ever heard of Dependency Confusion? It’s a clever way attackers can exploit package managers to infiltrate systems—and it’s a serious threat to software supply chains.
In my latest video, I break it all down: what it is, how it works, and how you can protect yourself. There’s even a live demo to make it super easy to follow.
If you’re into bug bounty hunting, ethical hacking, or just want to level up your security knowledge, this one’s for you.
Check it out and let me know what you think!
Video Link: https://www.youtube.com/watch?v=7ZcRNvmRz6E
Ever heard of Dependency Confusion? It’s a clever way attackers can exploit package managers to infiltrate systems—and it’s a serious threat to software supply chains.
In my latest video, I break it all down: what it is, how it works, and how you can protect yourself. There’s even a live demo to make it super easy to follow.
If you’re into bug bounty hunting, ethical hacking, or just want to level up your security knowledge, this one’s for you.
Check it out and let me know what you think!
Video Link: https://www.youtube.com/watch?v=7ZcRNvmRz6E
🔥12👍7
Hi everyone, which topic do you want me to create a new video on?
Anonymous Poll
56%
RCE with Dependency Confusion
38%
Cross Site Scripting
6%
Other(mention in comment)
🐳7
This media is not supported in your browser
VIEW IN TELEGRAM
Thinking on creating some videos on iOS Pentesting. Let me know what you all think
❤44🔥6👏6⚡3👍2
Hi everyone! Hope you all are having a great day! For the past two days, I have been creating a challenge based on my recent findings in a web app pentest which was highly secured. The video of it will be releasing soon on our official channel. However, For anyone who is going to solve the challenge, their name will be mention on our new video
Target: http://portal.bepractical.tech
Credential:
username: local
password: bepractical
Hint: We already have two videos on this topic already..maybe you can use it for reference😉
You can send us the report at: business@bepractical.tech
Target: http://portal.bepractical.tech
Credential:
username: local
password: bepractical
Hint: We already have two videos on this topic already..maybe you can use it for reference😉
You can send us the report at: business@bepractical.tech
❤13👍2😁1
Just wanted to let you all know that stored xss is now a known issue. Your goal is to find other vulnerabilities on the application
👍7❤5🔥2👎1
Let me rephrase the challenge for you all: Can you create more than 3 dashboard using your local account?
Website: http://portal.bepractical.tech
Username: local
Password: bepractical
Website: http://portal.bepractical.tech
Username: local
Password: bepractical
❤9👍3🔥2🙏2
Hi everyone, hope you all are doing well. I wanted to share something intriguing that I recently uncovered. There’s a vulnerability lurking in applications that most people completely overlook. It’s subtle, sneaky, and has the potential to cause significant damage if exploited—but hardly anyone talks about it.
Check out the video and let me know—have you ever encountered something like this? I’d love to hear your thoughts.
Video Link: https://www.youtube.com/watch?v=p7XxFeqNDko
#cybersecurity #bugbounty #bugbountytips #ethicalhacking #informationsecurity #privacy #security
Check out the video and let me know—have you ever encountered something like this? I’d love to hear your thoughts.
Video Link: https://www.youtube.com/watch?v=p7XxFeqNDko
#cybersecurity #bugbounty #bugbountytips #ethicalhacking #informationsecurity #privacy #security
YouTube
This Overlooked Vulnerability Can Cause Massive Damage (Live Demonstration) | Bug Bounty | 2024
There's a vulnerability hiding in plain sight—one that most people completely overlook. It's subtle, it's sneaky, and when exploited, it can wreak havoc on applications in ways you might not expect.
In this video, I uncover the secrets of this underrated…
In this video, I uncover the secrets of this underrated…
❤11👍7