Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Top War Stories from a Try Hard Bug Bounty Hunter, Rhynorater | Bug Bounty Village, DEF CON 32

Автор: Bug Bounty DEFCON

Загружено: 2025-05-22

Просмотров: 7092

Описание:

Speaker: Justin Gardner (@Rhynorater)
Presented at: Bug Bounty Village, DEF CON 32

Veteran bug bounty hunter Justin Gardner (@Rhynorater) shares 11 of his most impactful and technically challenging vulnerabilities discovered over the past few years of full-time hacking. Designed to simulate the “show-and-tell” experience at private live hacking events, this talk walks through the full process behind critical bugs that earned bounties ranging from $15K to $60K — including deep technical details, common missteps, and hard-won lessons.

Covering targets that span web apps, IoT devices, mobile apps, and desktop software, Justin highlights the value of high-effort manual techniques and a relentless curiosity. Expect insights into bypassing reverse proxies, abusing misconfigured auth flows, chaining multi-vector exploits, and even crafting remote exploits from firmware-level access and protocol abuse.

Topics include:

NGINX 403 bypass to 4.5M user PII leak
Account takeover via undocumented OAuth flows
Numeric IDORs exposing password reset tokens
Blind XSS via SMS chained to mass ATO
Invisible video meeting snooping through WebRTC misuse
Remote RCE via custom Perforce server and binary protocol abuse
Config injection on routers for persistent code execution
Double injection exploitation via DNSMASQ quirks
SQLi in version control software leading to session cookie theft
SIP protocol manipulation for spying and call hijacking in consumer IoT devices

This talk is packed with actionable takeaways for both new and experienced hackers:

Revisit old vulnerability classes in new contexts
Don’t shy away from targets outside your comfort zone
Collaborate with others to bridge knowledge gaps
Prioritize persistence and methodical investigation over automation

Whether you’re a bug bounty newcomer or a seasoned researcher, this is a deep-dive into high-ROI manual testing, creative exploit development, and the mindset it takes to turn edge cases into critical payouts.

#BugBounty #DEFCON #BBV #BugBountyVillage #Hacking #Infosec #WebSecurity #IoTSecurity #ManualTesting

Top War Stories from a Try Hard Bug Bounty Hunter, Rhynorater | Bug Bounty Village, DEF CON 32

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Efficient Bug Bounty Automation Techniques, Gunnar Andrews | Bug Bounty Village, DEF CON 32

Efficient Bug Bounty Automation Techniques, Gunnar Andrews | Bug Bounty Village, DEF CON 32

Маска подсети — пояснения

Маска подсети — пояснения

DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs

DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs

Everything about full-time bug bounty - Justin “rhynorater” Gardner from @criticalthinkingpodcast

Everything about full-time bug bounty - Justin “rhynorater” Gardner from @criticalthinkingpodcast

Reflections on a Decade in Bug Bounties | Bug Bounty Village, DEF CON 32

Reflections on a Decade in Bug Bounties | Bug Bounty Village, DEF CON 32

From 0 to a top bug bounty hunter - Johan Carlsson's journey to GitLab TOP1 on Hackerone

From 0 to a top bug bounty hunter - Johan Carlsson's journey to GitLab TOP1 on Hackerone

Leveraging AI for Smarter Bug Bounties | Bug Bounty Village, DEF CON 32

Leveraging AI for Smarter Bug Bounties | Bug Bounty Village, DEF CON 32

Bug bounty tools that actually land bugs with Arthur Aires

Bug bounty tools that actually land bugs with Arthur Aires

DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner

DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner

Prompt. Scan. Exploit - Ai's Journey Through Zero-Days And A Thousand Bugs

Prompt. Scan. Exploit - Ai's Journey Through Zero-Days And A Thousand Bugs

Суть разведки в программе bug bounty и пентестинге

Суть разведки в программе bug bounty и пентестинге

Balancing Bug Bounty Freedom with Hacking Time (Ep. 124)

Balancing Bug Bounty Freedom with Hacking Time (Ep. 124)

DEF CON 32 - Gotta Cache ‘em all  bending the rules of web cache exploitation - Martin Doyhenard

DEF CON 32 - Gotta Cache ‘em all bending the rules of web cache exploitation - Martin Doyhenard

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Archive Testing Methodology with Mathias Karlsson (Ep.132)

Archive Testing Methodology with Mathias Karlsson (Ep.132)

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Бесплатный курс и методика разведки для охотников за ошибками

Бесплатный курс и методика разведки для охотников за ошибками

How to Differentiate Yourself as a Bug Bounty Hunter - Mathias Karlsson @avlidienbrunn

How to Differentiate Yourself as a Bug Bounty Hunter - Mathias Karlsson @avlidienbrunn

Still not found your first bug? Try IDORs

Still not found your first bug? Try IDORs

The mindset for finding highs and crits in bug bounty with JR0ch17

The mindset for finding highs and crits in bug bounty with JR0ch17

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]