@bug_vs_me
Deepak bug_vs_me
1 year
Got BOUNTY for bypassing the credit limit, Turn on burp and explore web application later examine each and every api request that logged into burp! This takes a lot of time but is worthy it in the End 😉 #BugBounty
Tweet media one
6
5
116

Replies

@shubham_srt
𝙎𝙍𝙏 🇮🇳
1 year
@bug_vs_me Congrats! Can you explain a bit more about the bug
1
0
1
@bug_vs_me
Deepak bug_vs_me
1 year
@shubham_srt Not now but i will definitely after they fix this issue!
1
0
3
@eagle_0408
Meta
1 year
@bug_vs_me Which platform is this ?
1
0
0
@eagle_0408
Meta
1 year
@bug_vs_me Hey bro I just discover "500 Internal server error" on a login page by SQL injection payloads. Is this vulnerable to blind SQL injection ? If yes , please help me for further attack.
1
0
0
@bablusingh964
bablu singh
1 year
@bug_vs_me Program name?
0
0
0
@s7a6k
S7a6k
1 year
@bug_vs_me By which is are you using ?
0
0
0
@vivekbug
Vivek
1 year
@bug_vs_me Kon se pletform pe testing karte ho bhai
0
0
0