Open in app

Sign In

Write

Sign In

ganiganeshss79
ganiganeshss79

175 Followers

Home

About

Jul 6, 2022

Security Misconfiguration

Default Credentials leading to Admin Portal Access. Many web applications and hardware devices have default passwords for the built-in administrator account. Although these can be randomly generated, they are often static, meaning they can be easily guessed or obtained by an attacker. Additionally, when new users are created on the…

Bugbounting

1 min read

Security Misconfiguration
Security Misconfiguration
Bugbounting

1 min read


Dec 18, 2021

Business Logic Vulnerability:

How I was able to Load Money Into My Account. What are business Logic vulnerabilities? Business Logic Vulnerabilities come down to imperfections within the execution and plan of your application or site. In the event that you accept that your site or app is as it was progressing to be utilized by genuine clients, there will be no frame of…

Bugbounting

2 min read

Business Logic Vulnerability:
Business Logic Vulnerability:
Bugbounting

2 min read


Dec 16, 2021

User Enumeration- Forgot Password #VDP

User Enumeration:

Vdp

1 min read

Vdp

1 min read


Dec 16, 2021

How I was able to get points easily on bugbounty platforms- CVE 2020-3452 and CVE 2020-3187.

Hello Everyone, Welcome to another blog. To people who don’t know me myself Ganesh, I am a security analyst at WesecureApp and a Part-time bug bounty hunter at Bugcrowd. What is CVE 2020–3452? A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat…

3 min read

3 min read


Published in System Weakness

·Dec 16, 2021

HTTP VERB TAMPERING:

HTTP VERB TAMPERING: HTTP Verb Altering is an assault that misuses vulnerabilities in HTTP verb (too known as HTTP strategy) verification and gets to control components. …

Cybersecurity

2 min read

HTTP VERB TAMPERING:
HTTP VERB TAMPERING:
Cybersecurity

2 min read


Jun 14, 2021

Insecure Direct Object Reference (IDOR)- PII Data Leak

Thanks, hackers community, You all inspire me a lot. Insecure Direct Object Reference (called IDOR from here) occurs when a application exposes a reference to an internal implementation object. Using this way, it reveals the real identifier and format/pattern used of the element in the storage backend side. …

Cybersecurity

2 min read

Insecure Direct Object Reference (IDOR)- PII Data Leak
Insecure Direct Object Reference (IDOR)- PII Data Leak
Cybersecurity

2 min read


Jun 14, 2021

Hadoop Environment

What is Hadoop? Hadoop is an open-source software framework for storing data and running applications on clusters of commodity hardware. It provides massive storage for any kind of data, enormous processing power and the ability to handle virtually limitless concurrent tasks or jobs. Types of components in Hadoop? Storage Unit → HDFS (Hadoop…

5 min read

Hadoop Environment
Hadoop Environment

5 min read


Oct 2, 2020

Email Verification Bypass + 2FA bypass-Bugbounty #150$

Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. Thank You, community folks, @stokfredik @hakluke @farah_hawa01 @dhakal_ananda @adityashende17 Bugcrowd Mentors: @akhilreni_hs @rakesh_3895 Hello Everyone, Welcome to another blog. To people who don’t know me myself Ganesh…

Bug Bounty

3 min read

Bug Bounty

3 min read


Sep 26, 2020

#Bugbounty “How I was able to get 200$ in less than five minutes” —No Rate Limitation.

Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. Thank You, community folks, @akhilreni_hs @stokfredik @hakluke @farah_hawa01 @dhakal_ananda @adityashende17 @bugcrowd @rakesh_3895 Hello Everyone, Welcome to another blog. To people who don’t know me myself Ganesh, I…

Bug Bounty

2 min read

#Bugbounty “How I was able to get 200$ in less than five minutes” —No Rate Limitation.
#Bugbounty “How I was able to get 200$ in less than five minutes” —No Rate Limitation.
Bug Bounty

2 min read


Sep 22, 2020

#Bugbounty- “How I was able to see other users Payments in a travel application” — IDOR #800$

Let me thank all the bug bounty hunters over there who are creating great content and inspiring a lot of people like me. Thank You, community folks, @akhilreni_hs @stokfredik @hakluke @farah_hawa01 @dhakal_ananda @adityashende17 @bugcrowd @rakesh_3895 Hi Guys, Myself Ganesh, I am a security analyst at WesecureApp and a part-time bug…

Bug Bounty Tips

2 min read

#Bugbounty- “How I was able to see other users Payments in a travel application” — IDOR #800$
#Bugbounty- “How I was able to see other users Payments in a travel application” — IDOR #800$
Bug Bounty Tips

2 min read

ganiganeshss79

ganiganeshss79

175 Followers

Lazy Kid | Security Analyst |

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech