- 56
- 305 392
Abhishek Morla
India
เข้าร่วมเมื่อ 27 ส.ค. 2017
Ethical Bug Bounty Reports POC || Labs Tutorial
For the removal of the video DM at www.linkedin.com/in/abhishekmorla
Disclaimer: Elevate your cybersecurity skills! 🛡️ Explore recreated Proofs of Concept (PoCs) created on my own system to enhance understanding of ethical hacking techniques. Unravel the complexities with me and stay ahead in the bug bounty game! This content is solely for educational purposes, based mostly on open-source programs or PoCs of already fixed vulnerabilities. No exploitations or data breaches are conducted for the PoCs on this channel. Always obtain proper authorization before performing any bug bounty testing.
For the removal of the video DM at www.linkedin.com/in/abhishekmorla
Disclaimer: Elevate your cybersecurity skills! 🛡️ Explore recreated Proofs of Concept (PoCs) created on my own system to enhance understanding of ethical hacking techniques. Unravel the complexities with me and stay ahead in the bug bounty game! This content is solely for educational purposes, based mostly on open-source programs or PoCs of already fixed vulnerabilities. No exploitations or data breaches are conducted for the PoCs on this channel. Always obtain proper authorization before performing any bug bounty testing.
$750 bounty sensitive data exposure vulnerability by HTTP Request Smuggling | bug bounty poc 2024
Gunicorn does not properly validate the value of the 'Transfer-Encoding' header as specified in the RFC standards, which leads to the default fallback method of 'Content-Length,' making it Vulnerable to TE CL request smuggling.
-----------------------------------------------------------------------
Twitter: abhishekmorla
Website: abhishekmorla.netlify.app/
Linkedin: www.linkedin.com/in/abhishekmorla
------------------------------------------------------------------------
⚠️ Disclaimer: This content is solely for educational purposes and should not be used for unauthorized activities. Always obtain proper authorization before performing any security testing.
Join this channel to get access to the perks:
th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin
-----------------------------------------------------------------------
Twitter: abhishekmorla
Website: abhishekmorla.netlify.app/
Linkedin: www.linkedin.com/in/abhishekmorla
------------------------------------------------------------------------
⚠️ Disclaimer: This content is solely for educational purposes and should not be used for unauthorized activities. Always obtain proper authorization before performing any security testing.
Join this channel to get access to the perks:
th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin
มุมมอง: 2 812
วีดีโอ
$3500 Bounty Server Side Template Injection SSTI Bug Bounty Video POC | Private Bug Bounty Program
มุมมอง 2.4K4 หลายเดือนก่อน
The system is susceptible to a critical unauthenticated server-side template injection (SSTI) vulnerability. This allows a remote attacker to execute arbitrary code with the same privileges as the user account running the server, posing a severe security risk. Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to ...
Earn Up to $5000 bounty Monthly with This Exclusive Bug Bounty Platform....
มุมมอง 1.3K4 หลายเดือนก่อน
Join this exclusive bug bounty platform to earn up to $5000 monthly in rewards! Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to get access to the latest bug bounty tips: th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin #bugbounty2024 #ethicalhacking #bugbountytips #vulnerabilitydisclosure #hacktheplanet #...
Unauthenticated SQL Injection Video POC | Open Source Bug Bounty Program
มุมมอง 1.6K4 หลายเดือนก่อน
Join this channel to get access to the perks: th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin
$9000 Blind XXE injection Video POC | Private Bug Bounty Program 2024 | P1 Critical Vulnerability
มุมมอง 3.2K4 หลายเดือนก่อน
Blind XXE with out-of-band interaction | P1 Critical Vulnerability Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla Join this channel to get access to the latest bug bounty tips: th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin #BugBounty2024 #EthicalHacking #BugBountyTips #VulnerabilityDisclosure #HackThePlanet #SecurityResea...
$1500 bounty : authentication bypass + unauthenticated configurations access | POC | Bug Bounty 2024
มุมมอง 7K5 หลายเดือนก่อน
In this video, we delve into an authentication bypass vulnerability where an attacker exploits a flaw to gain initial access. By issuing a Privilege 15 command, the attacker creates a local user and password combination, allowing them to log in with normal user access. Learn how this vulnerability works and the steps to protect your systems from such exploits. Twitter: abhishekmorla...
Authentication Bypass Vulnerability Using LDAP Injection | POC | 2024
มุมมอง 2.9K5 หลายเดือนก่อน
Join this channel to get access to the perks: th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin References: www.cobalt.io/blog/introduction-to-ldap-injection-attack github.com/fuzzdb-project/fuzzdb/blob/master/attack/ldap/ldap-injection.txt Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla
$2500 bounty: htaccess overwrite file upload vulnerability | POC | Bug Bounty 2024 | private program
มุมมอง 6K7 หลายเดือนก่อน
Join this channel to get access to the perks: th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin . . . . . cat .htaccess AddType application/x-httpd-php .shell #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercommunity #bughuntingcourse2021 ...
Unauthenticated Code Execution Without Metasploit | Reverse Connection | Post Exploitation Video POC
มุมมอง 1.2K7 หลายเดือนก่อน
Join this channel to get access to the perks: th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin github.com/Ridter/redis-rce github.com/n0b0dyCN/RedisModules-ExecuteCommand Redis 4.x/5.x RCE #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackerc...
$1400 bounty File Upload Vulnerability leads to Reverse Connection | Private Bug Bounty POC 2024
มุมมอง 2.5K7 หลายเดือนก่อน
Join this channel to get access to the perks: th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin . . #bugbounty #ethicalhacking #penetrationtesting #remotecodeexecution #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercommunity #bughuntingcourse2021 #securityflaw #exploit #webapplicationsecurity #cyberawaren...
$1000 bounty: Remote Code Execution via Aspell Pathname | POC | Bug Bounty 2024 | Private Program
มุมมอง 1.5K7 หลายเดือนก่อน
$1000 bounty: Remote Code Execution via Aspell Pathname | POC | Bug Bounty 2024 | Private bug bounty Program Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla This Proof of Concept (PoC) demonstration unveils the steps behind this successful hack, showcasing how vulnerabilities can result in reverse shell. Stay tuned for an insigh...
$3900 bounty: Remote Code Execution via File Upload Vulnerability | POC | live Bug Bounty 2024
มุมมอง 3.9K8 หลายเดือนก่อน
Private Host Bug Bounty Program | bug bounty poc Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla #fileuploadvulnerability #bugbounty #ethicalhacking #websecurity #cybersecurity #poc #vulnerabilityresearch #serversideinjection #hackercommunity #bughuntingcourse2021 #securityflaw #exploit #webapplicationsecurity #cyberawareness ⚠️...
Remote Code Execution via Arbitrary File Upload Vulnerability | Bug Bounty Methodology | WordPress
มุมมอง 2.7K8 หลายเดือนก่อน
Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla #BugBounty #EthicalHacking #penetrationtesting #RemoteCodeExecution #FileUploadVulnerability #BugBounty #EthicalHacking #WebSecurity #Cybersecurity #POC #VulnerabilityResearch #ServerSideInjection #HackerCommunity #BugHunting #SecurityFlaw #Exploit #WebApplicationSecurity #CyberAwa...
OS Command Injection Vulnerability Bug bounty POC | Bug Bounty Methodology | Finding Injection Point
มุมมอง 5K8 หลายเดือนก่อน
Twitter: abhishekmorla Website: abhishekmorla.netlify.app/ Linkedin: www.linkedin.com/in/abhishekmorla
Bug Bounty Methodology Live Hunting | Remote Code Execution via SQL Vulnerability | POC 2024
มุมมอง 1.6K9 หลายเดือนก่อน
Bug Bounty Methodology Live Hunting | Remote Code Execution via SQL Vulnerability | POC 2024
$1000 Bounty | Command Injection Vulnerability | Bug Bounty POC
มุมมอง 2.5K9 หลายเดือนก่อน
$1000 Bounty | Command Injection Vulnerability | Bug Bounty POC
$2900 Bounty SQL Injection Bug Bounty POC 2024 | Private Bug Bounty Program
มุมมอง 9K9 หลายเดือนก่อน
$2900 Bounty SQL Injection Bug Bounty POC 2024 | Private Bug Bounty Program
$1700 Bounty | Unauthenticated Command Injection Vulnerability | Bug Bounty Methodology | POC
มุมมอง 4.5K9 หลายเดือนก่อน
$1700 Bounty | Unauthenticated Command Injection Vulnerability | Bug Bounty Methodology | POC
$3500 Bounty | Unauthenticated Time Based SQL Injection Bug Bounty POC | Private Bug Bounty Program
มุมมอง 5K9 หลายเดือนก่อน
$3500 Bounty | Unauthenticated Time Based SQL Injection Bug Bounty POC | Private Bug Bounty Program
Bug Bounty POC 2024: Remote Command Execution through Unvalidated File Upload
มุมมอง 1.9K9 หลายเดือนก่อน
Bug Bounty POC 2024: Remote Command Execution through Unvalidated File Upload
$100 Quick Win Bounty | Weak Password Policy | bug bounty tips 2024 | POC | Authentication Testing
มุมมอง 1.1K9 หลายเดือนก่อน
$100 Quick Win Bounty | Weak Password Policy | bug bounty tips 2024 | POC | Authentication Testing
$10,000 bounty: Unauthenticated Blind SQL Injection | POC | Private Bug Bounty Program 2024
มุมมอง 6K9 หลายเดือนก่อน
$10,000 bounty: Unauthenticated Blind SQL Injection | POC | Private Bug Bounty Program 2024
$3,133 bounty: Remote Code Execution via Local File Inclusion | POC | Bug Bounty 2024
มุมมอง 8K10 หลายเดือนก่อน
$3,133 bounty: Remote Code Execution via Local File Inclusion | POC | Bug Bounty 2024
$2100 Time Based SQL Injection Bug Bounty POC
มุมมอง 10K10 หลายเดือนก่อน
$2100 Time Based SQL Injection Bug Bounty POC
$800 Advanced Stored Cross Site Scripting Filter Bypass to Account Takeover | Bug Bounty PoC 2024
มุมมอง 2.5K10 หลายเดือนก่อน
$800 Advanced Stored Cross Site Scripting Filter Bypass to Account Takeover | Bug Bounty PoC 2024
$1900 Unauthenticated Database Credential Access through Code Execution | Bug Bounty |CVE 2023-35813
มุมมอง 3.6K10 หลายเดือนก่อน
$1900 Unauthenticated Database Credential Access through Code Execution | Bug Bounty |CVE 2023-35813
€7500 Unauthenticated Blind Remote Code Execution Bug Bounty POC | Private Program | CVE-2023-38646
มุมมอง 7Kปีที่แล้ว
€7500 Unauthenticated Blind Remote Code Execution Bug Bounty POC | Private Program | CVE-2023-38646
$1,913 Unauthenticated SSRF Leading To Interal Port Scanning | Bug Bounty POC 2023 | P3 Severity
มุมมอง 11Kปีที่แล้ว
$1,913 Unauthenticated SSRF Leading To Interal Port Scanning | Bug Bounty POC 2023 | P3 Severity
$800 Authentication Bypass Bug Bounty POC 2023 | Broken Authentication & Session Management | P1
มุมมอง 6Kปีที่แล้ว
$800 Authentication Bypass Bug Bounty POC 2023 | Broken Authentication & Session Management | P1
$9060 OS Command Injection POC | Private Bug Bounty Program 2023 | P1 Insecure OS Firmware
มุมมอง 23Kปีที่แล้ว
$9060 OS Command Injection POC | Private Bug Bounty Program 2023 | P1 Insecure OS Firmware
Ssrf to rce ??? Bro
Do you make this payload your self??? Or if not Where are you find this payload
Github
Bro casually dropped a zero day
great video, but it should be watch at x0.50 speed
Finally you solved my problem of how to get interactive shell and port forwarding with ngrok 🎉❤
That is not vulnerability
Ok
Nice is it your own 0day or you used a 0day from exploitdb like that
Exploit db like that
Hi can you please link cve id you exploited and is it in nuclei templates?
Join channel
🎉
How to connect u Please bro reply Need your help pls
Connect at LinkedIn
what did you think this is so hipotetik
its a lab
is showing like this about bug bounty platform is fair?
Yes , after the vuln get fixed you can share
@@abhishekmorla1 is that private or public program
Good one bro....is this working??
No
how you know the path ??
Source code
I may have uploaded a php file with this method. I may ask the same question as everyone else, but if the file is uploaded, can I find the path where this file is uploaded?
Use source code
What is your mindest when you hack
to get ahead of other hunters
Did you get bounty for this.?
U can’t find servers like this in the public internet 😅
oh..
what sofeware are you use?
Did u tried to esclate it to RCE ?
No
Isn't it a self xss?
Sir do you always need to find xss vuln to get a sql injection ?
No
@@abhishekmorla1 thanks for the replay
Can the bypass authentication and configuration coding be used for all websites or do some things need to be replaced, such as xmlns, please explain. thanks before
Hello, I've been dealing with a security vulnerability related to Swagger UI for a few days. However, I need to determine whether the site is using Swagger UI. When I query (e.g., using Shodan, Google dorks), I encounter limitations. I've made a list of possible endpoints, but I haven't found anything so far. This has become almost an obsession for me. Can you suggest a method for detecting Swagger UI?
Do they pay bounty right now?
No
@@abhishekmorla1 ah i found 1 rce too :/
Great Content,I Just learned a new method 😊
Nice
Wooww buddy, veryy nice... Awsome.. i am really jealous of you; in a right way :)... Wonderfull find...
this is mind blowing technique , where did you learn all these?
Google
if it is CVE then please mentioned in the youtube title , you don't even explain how it works then why you are wasting some much time, the exploit is publicly available in the internet if you hunt for cve then kindly please explain it hwo it works, rather then just copy the content and pasting it.
ok thanks sir
How you write Xml code?
using keyboard and you?
Almost $3k for this. I find it hard to believe it. But nice video.
What softwere were use in this video?
burpsuite
Sir,how do i know that if there is this bug or not? Plz,inform me.
join the channel
aisi report developer dekhega to apni job chord dega bro thoda homework karke poc banao
ok bhai
@@abhishekmorla1 is video mai cuts lagao bro warna watch time kam milega
@@abhishekmorla1 bro is video mai cuts lagao warna watch time kam milega
Bro informative video, how you leran this type of bugs?
from cves
Where to learn bug Bounty and I want hunt like you , please reply me sir..!
join the channel th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin
bug bounty program poc on localhost???
you have to install the open source application in to your local machine
Can you give me link site hack tips like that, to see what the ext can to upload in server target?
join the channel th-cam.com/channels/9IAh1JN4lhSVz193GvZVZg.htmljoin
Do you pentest android/IOS?
Yes
But cisco don’t pay I guess
Weird to see shelshock in the wield
Bhai aap video voice ke sath Banya karo or poc ko samajya kro
i will
Brother, use codeium, copilot or someshit like that to write 3 times faster.
thanks
@@abhishekmorla1 the Yhe reason u are that good is because u didn't use copilot..
This all are unique stuff I have been not seeing anywhere. Thanks for sharing. please also share writeupss if available.
Bdiya video thi bhai ek do or aaesi hi video bnao senerio base ❤
Bro I need to learn python module for cyber security where should I do
create tools from scratch and you will learn it automatically
Tools banana kha se seekhe ? Any road map or resource?
@@HarshSingh-ik3qx youtube