ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Top War Stories from a Try Hard Bug Bounty Hunter, Rhynorater | Bug Bounty Village, DEF CON 32

Автор: Bug Bounty DEFCON

Загружено: 2025-05-22

Просмотров: 7019

Описание: Speaker: Justin Gardner (@Rhynorater)
Presented at: Bug Bounty Village, DEF CON 32

Veteran bug bounty hunter Justin Gardner (@Rhynorater) shares 11 of his most impactful and technically challenging vulnerabilities discovered over the past few years of full-time hacking. Designed to simulate the “show-and-tell” experience at private live hacking events, this talk walks through the full process behind critical bugs that earned bounties ranging from $15K to $60K — including deep technical details, common missteps, and hard-won lessons.

Covering targets that span web apps, IoT devices, mobile apps, and desktop software, Justin highlights the value of high-effort manual techniques and a relentless curiosity. Expect insights into bypassing reverse proxies, abusing misconfigured auth flows, chaining multi-vector exploits, and even crafting remote exploits from firmware-level access and protocol abuse.

Topics include:

NGINX 403 bypass to 4.5M user PII leak
Account takeover via undocumented OAuth flows
Numeric IDORs exposing password reset tokens
Blind XSS via SMS chained to mass ATO
Invisible video meeting snooping through WebRTC misuse
Remote RCE via custom Perforce server and binary protocol abuse
Config injection on routers for persistent code execution
Double injection exploitation via DNSMASQ quirks
SQLi in version control software leading to session cookie theft
SIP protocol manipulation for spying and call hijacking in consumer IoT devices

This talk is packed with actionable takeaways for both new and experienced hackers:

Revisit old vulnerability classes in new contexts
Don’t shy away from targets outside your comfort zone
Collaborate with others to bridge knowledge gaps
Prioritize persistence and methodical investigation over automation

Whether you’re a bug bounty newcomer or a seasoned researcher, this is a deep-dive into high-ROI manual testing, creative exploit development, and the mindset it takes to turn edge cases into critical payouts.

#BugBounty #DEFCON #BBV #BugBountyVillage #Hacking #Infosec #WebSecurity #IoTSecurity #ManualTesting

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Top War Stories from a Try Hard Bug Bounty Hunter, Rhynorater | Bug Bounty Village, DEF CON 32

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Efficient Bug Bounty Automation Techniques, Gunnar Andrews | Bug Bounty Village, DEF CON 32

Efficient Bug Bounty Automation Techniques, Gunnar Andrews | Bug Bounty Village, DEF CON 32

Balancing Bug Bounty Freedom with Hacking Time (Ep. 124)

Balancing Bug Bounty Freedom with Hacking Time (Ep. 124)

DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner

DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner

The mindset for finding highs and crits in bug bounty with JR0ch17

The mindset for finding highs and crits in bug bounty with JR0ch17

Взлом Wi-Fi: что хакер сможет сделать с вашей сетью?

Взлом Wi-Fi: что хакер сможет сделать с вашей сетью?

Everything about full-time bug bounty - Justin “rhynorater” Gardner from @criticalthinkingpodcast

Everything about full-time bug bounty - Justin “rhynorater” Gardner from @criticalthinkingpodcast

DEF CON 32 - Gotta Cache ‘em all  bending the rules of web cache exploitation - Martin Doyhenard

DEF CON 32 - Gotta Cache ‘em all bending the rules of web cache exploitation - Martin Doyhenard

Крах Jaguar: Как “повестка” в рекламе добила легенду британского автопрома

Крах Jaguar: Как “повестка” в рекламе добила легенду британского автопрома

DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs

DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs

Это простое кодирование URL принесло мне 50 000 долларов в качестве вознаграждения

Это простое кодирование URL принесло мне 50 000 долларов в качестве вознаграждения

Суть разведки в программе bug bounty и пентестинге

Суть разведки в программе bug bounty и пентестинге

Demystifying Bug Bounties: Insights from a Decade of Experience - Yassine Aboukir

Demystifying Bug Bounties: Insights from a Decade of Experience - Yassine Aboukir

The Untapped Bug Bounty Landscape of IoT w/ Matt Brown (Ep. 89)

The Untapped Bug Bounty Landscape of IoT w/ Matt Brown (Ep. 89)

Bug bounty tools that actually land bugs with Arthur Aires

Bug bounty tools that actually land bugs with Arthur Aires

Inside an Ethical Hacker’s Mind: Godfather Orwa on #cybersecurity & #bugbounty Secrets | Episode 3

Inside an Ethical Hacker’s Mind: Godfather Orwa on #cybersecurity & #bugbounty Secrets | Episode 3

Archive Testing Methodology with Mathias Karlsson (Ep.132)

Archive Testing Methodology with Mathias Karlsson (Ep.132)

DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle

DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle

Reflections on a Decade in Bug Bounties | Bug Bounty Village, DEF CON 32

Reflections on a Decade in Bug Bounties | Bug Bounty Village, DEF CON 32

My First Bug Bounty Experience (It Was a Mess!)

My First Bug Bounty Experience (It Was a Mess!)

Bug Bounty Tip | Do This Exercise Every Day to Get Better at Finding XSS Bugs!

Bug Bounty Tip | Do This Exercise Every Day to Get Better at Finding XSS Bugs!

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]