Open in app
Home
Notifications
Lists
Stories

Write
ganiganeshss79
ganiganeshss79

Home
About

Dec 18, 2021

Business Logic Vulnerability:

How I was able to Load Money Into My Account. — How I was able to Load Money Into My Account. What are business Logic vulnerabilities? Business Logic Vulnerabilities come down to imperfections within the execution and plan of your application or site. In the event that you accept that your site or app is as it was progressing to be utilized by genuine clients, there will be no frame of…

Bugbounting

2 min read

Business Logic Vulnerability:
Business Logic Vulnerability:

Dec 16, 2021

User Enumeration- Forgot Password #VDP

User Enumeration: —

Vdp

1 min read

VDP Program

User Enumeration- Forgot Password #VDP

--

--


Dec 16, 2021

How I was able to get points easily on bugbounty platforms- CVE 2020-3452 and CVE 2020-3187.

Hello Everyone, — Hello Everyone, Welcome to another blog. To people who don’t know me myself Ganesh, I am a security analyst at WesecureApp and a Part-time bug bounty hunter at Bugcrowd. What is CVE 2020–3452? A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat…

3 min read


Published in System Weakness

·Dec 16, 2021

HTTP VERB TAMPERING:

HTTP Verb Altering is an assault that misuses vulnerabilities in HTTP verb (too known as HTTP strategy) verification and gets to control… — HTTP VERB TAMPERING: HTTP Verb Altering is an assault that misuses vulnerabilities in HTTP verb (too known as HTTP strategy) verification and gets to control components. Numerous confirmation components as they were constrained to get to the foremost common HTTP strategies, in this way permitting unauthorized get to confined assets by other HTTP…

Cybersecurity

2 min read

HTTP VERB TAMPERING:
HTTP VERB TAMPERING:

Jun 14, 2021

Insecure Direct Object Reference (IDOR)- PII Data Leak

Thanks, hackers community, You all inspire me a lot. — Thanks, hackers community, You all inspire me a lot. Insecure Direct Object Reference (called IDOR from here) occurs when a application exposes a reference to an internal implementation object. Using this way, it reveals the real identifier and format/pattern used of the element in the storage backend side. …

Cybersecurity

2 min read

Insecure Direct Object Reference (IDOR)- PII Data Leak
Insecure Direct Object Reference (IDOR)- PII Data Leak

Jun 14, 2021

Hadoop Environment

What is Hadoop? — What is Hadoop? Hadoop is an open-source software framework for storing data and running applications on clusters of commodity hardware. It provides massive storage for any kind of data, enormous processing power and the ability to handle virtually limitless concurrent tasks or jobs. Types of components in Hadoop? Storage Unit → HDFS (Hadoop…

5 min read

Hadoop Environment
Hadoop Environment

Oct 2, 2020

Email Verification Bypass + 2FA bypass-Bugbounty #150$

Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. — Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. Thank You, community folks, @stokfredik @hakluke @farah_hawa01 @dhakal_ananda @adityashende17 Bugcrowd Mentors: @akhilreni_hs @rakesh_3895 Hello Everyone, Welcome to another blog.

Bug Bounty

3 min read


Sep 26, 2020

#Bugbounty “How I was able to get 200$ in less than five minutes” —No Rate Limitation.

Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. — Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. Thank You, community folks, @akhilreni_hs @stokfredik @hakluke @farah_hawa01 @dhakal_ananda @adityashende17 @bugcrowd @rakesh_3895 Hello Everyone, Welcome to another blog.

Bug Bounty

2 min read

#Bugbounty “How I was able to get 200$ in less than five minutes” —No Rate Limitation.
#Bugbounty “How I was able to get 200$ in less than five minutes” —No Rate Limitation.

Sep 22, 2020

#Bugbounty- “How I was able to see other users Payments in a travel application” — IDOR #800$

Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. — Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. Thank You, community folks, @akhilreni_hs @stokfredik @hakluke @farah_hawa01 @dhakal_ananda @adityashende17 @bugcrowd @rakesh_3895 Hi Guys, Myself Ganesh, I am a security analyst at WesecureApp and a part-time bug…

Bug Bounty Tips

2 min read

#Bugbounty- “How I was able to see other users Payments in a travel application” — IDOR #800$
#Bugbounty- “How I was able to see other users Payments in a travel application” — IDOR #800$
ganiganeshss79

ganiganeshss79

Lazy Kid | Security Analyst |

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable