Iβve spent 2 solid hours doing bug bounty and I still havenβt made $200k.
Can someone tell me what Iβm doing wrong?
#bugbountytips
@snyff.pentesterlab.com
Founder/CEO/Trainer/Researcher/CVE archeologist @PentesterLab. Security engineer. Bugs are my own, not of my employer...
Iβve spent 2 solid hours doing bug bounty and I still havenβt made $200k.
Can someone tell me what Iβm doing wrong?
#bugbountytips
AI-generated code is reshaping secure code reviewβfewer trivial bugs, but more hidden threats.
Read more in our new blog post:
pentesterlab.com/blog/secure-...
What do you think?
Think teaching devs to hack is risky?
In reality, a bit of hacking knowledge helps them spot vulnerabilities early and build stronger apps.
Discover why having devs with a 'hacker mindset' is a win for security:
pentesterlab.com/blog/why-dev...
From now on, I'll call any snippet of vulnerable code shared on Social Media as
"Security Code Review Porn"
It gives the wrong expectations about what real code review actually involves.
Articles worth reading discovered last week:
π€ blog.doyensec.com/2025/01/30/o...
β οΈ www.feistyduck.com/newsletter/i...
π pathonproject.com/zb/?871f0933...
And as always, itβs in our blog: pentesterlab.com/blog/researc...
#PentesterLabWeekly
If youβre in the area, hereβs my schedule:
* OWASP Bay Area (Feb 11)
* CactusCon in Mesa/Phoenix (Feb 14 & 15)
* OWASP Los Angeles (Feb 18)
* OWASP Orange County (Feb 20)
Iβd love to connectβif youβre nearby, please stop by and say hello (and maybe grab some swag)!
Iβm excited to share that in a few weeks Iβll be heading to the US for a series of talks and workshops focused on security code review and JWTβand Iβll be bringing some
@pentesterlab.com swag along too!
π Level up your #CyberSecurity skills FOR FREE! π‘οΈ
Earn the Recon Badge with Pentesterlab and master: π Virtual Hosts π DNS Recon π TLS Recon ...and so much more!
Start your journey today
π pentesterlab.com/badges/recon
...
22.01.2025 09:35 β π 2 π 0 π¬ 1 π 0Networking in InfoSec isnβt just about IP addresses and portsβitβs also about people!
Discover how meetups, conferences, and volunteering can open big career doors in InfoSec.
Read more: pentesterlab.com/blog/infosec...
Someone shared this write-up in the @pentesterlab.com 's discord:
www.wiz.io/blog/nuclei-...
I love this article so much! The content and the analysis are A+
I really like the π© (very similar to pentesterlab.com/blog/another...)
Have a great weekend and enjoy some tunes:
youtu.be/j_Md8_7mhOU
If your New Yearβs resolution is to get better at web security code review, donβt miss our upcoming live training. Learn how to find vulnerabilities and strengthen your skills:
pentesterlab.gumroad.com
Happy New Year!
pentesterlab.com/gift/xDzcB35... (3-month)
pentesterlab.com/gift/UBMtCsi... (3-month)
pentesterlab.com/gift/BWEYEme... (3-month)
Golang: because hackers havenβt given up on SQL injection in 2024...
30.12.2024 00:48 β π 11 π 1 π¬ 1 π 0π
pentesterlab.com/gift/v5kegJq... (3-month)
pentesterlab.com/gift/4VG6RYU... (3-month)
pentesterlab.com/gift/lsgfEwJ... (3-month)
Thank you! βΊοΈβΊοΈβΊοΈ
23.12.2024 06:09 β π 1 π 0 π¬ 0 π 0Someone replied that I had the wrong handle for James, I fixed it but I cannot find the original message.
Thanks to whoever raised it.
I put together a VERY limited (for now) list of web hackers in a Starter pack:
go.bsky.app/9uay4Ad
A lot of people are missing (I will try to add more as I find them) but make sure you follow people already in the list!
Cross-Site POST Requests Without a Content-Type Header by @lukejahnke
https://nastystereo.com/security/cross-site-post-without-content-type.html
#BBRENewsletter85
β€It is why I am a huge fan and student of @pentesterlab.com and @snyff.pentesterlab.com
π±This lab show me that I was wrong, since several years, recommending to dev teams using a hash of the token as identifier in a revocation list.
π₯°Now, I know the correct recommendation to provide.
#appsec #jwt
Want to level up your learning in security? π Stop scrolling and start reflecting.
'Reading Between the Lines' challenges you to dig deeper:
1οΈβ£ What can I learn from this?
2οΈβ£ What patterns apply elsewhere?
3οΈβ£ Why didnβt I spot this?
The real breakthroughs come when you ask the right questions. π‘
π
Yes, just a one off :/
07.12.2024 08:20 β π 1 π 0 π¬ 1 π 0I didn't want to spoil the solution
05.12.2024 22:21 β π 0 π 0 π¬ 0 π 0The real question now is what kind of automation do you have in place to discover this code change/commit π
05.12.2024 21:59 β π 0 π 0 π¬ 0 π 0These are simple issues, but they illustrate how, by thinking of vulnerabilities as patterns rather than code, you can move from one language to another.
05.12.2024 21:57 β π 4 π 1 π¬ 1 π 0printf 'first**|uname' | ruby hack.rb
05.12.2024 21:53 β π 0 π 0 π¬ 2 π 0