
The Bug Hunter’s Methodology – Application Analysis | Jason Haddix

Source link
Related Articles
All Mix →Misconfigured JSF ViewStates can lead to severe RCE vulnerabilities
Table of Contents Intro Scope The state of the ViewState Server-side ViewState Client-side ViewState The attack on the ViewState The preconditions for a successful attack…
BugQuest 2026: 31 Days of Broken Access Control
In March 2026, we ran BugQuest, a 31-day campaign covering everything you need to know about finding and exploiting broken access control vulnerabilities. From understanding…
A Sad Outlook for Humanity
This doesn’t bode well. Here’s an interesting list of predictions from the study: The main drivers of religious affiliation to 2043 are immigration and secularization.…
GUEST BLOG: Vulnerability Disclosure Adoption In The Consumer IoT space Is Lagging, But What About Elsewhere?
There is a lot of focus, rightly so, on the consumer IoT space. We have had a lot of incidents in the past few years…
Hacker Herding – Bug Bounty Tips from Sky Betting & Gaming
UK-based Sky Betting & Gaming recently launched their own bug bounty program and shared some tips in a blog post: Hacker Herding – Ten Lessons…
[BugBounty] Decoding a $😱,000.00 htpasswd bounty
tldr; A Private Bug Bounty Program had a globally readable .htpasswd file. I cracked the DES hash, got access to development and staging environments and…