#NahamCon2024

Sdílet
Vložit
  • čas přidán 4. 06. 2024
  • LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍
    In the talk "GraphQL is the New PHP," we dive into how to find bugs in GraphQL, similar to early PHP days. It's all about sharing tips and tricks for bug bounty hunters to spot security issues. This talk is like a collection of what I've learned, the mistakes I made, and some wins along the way.
    📚 If you want to learn bug bounty hunting from me: bugbounty.nahamsec.training
    💻 If you want to practice soem of my free labs and challenges: app.hacking.hub.io
    🔗 LINKS:
    📖 MY FAVORITE BOOKS:
    Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -amzn.to/3Re8Pa2
    Hacking APIs: Breaking Web Application Programming Interfaces - amzn.to/45g4bOr
    Black Hat GraphQL: Attacking Next Generation APIs - amzn.to/455F9l3
    🍿 WATCH NEXT:
    If I Started Bug Bounty Hunting in 2024, I'd Do this - • If I Started Bug Bount...
    2023 How to Bug Bounty - • How to Bug Bounty in 2023
    Bug Bounty Hunting Full Time - youtu.be/watch?v=ukb79vAgRiY
    Hacking An Online Casino - youtu.be/watch?v=2eIDxVrk4a8
    WebApp Pentesting/Hacking Roadmap - youtu.be/watch?v=doFo0I_KU0o
    MY OTHER SOCIALS:
    🌍 My website - www.nahamsec.com/
    👨‍💻 My free labs - app.hackinghub.io/
    🐦 Twitter - / nahamsec
    📸 Instagram - / nahamsec
    👨‍💻 Linkedin - / nahamsec
    WHO AM I?
    If we haven't met before, hey 👋! I'm Ben, most people online know me online as NahamSec. I'm a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.
    FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

Komentáře • 19

  • @joy3658
    @joy3658 Před 16 dny +3

    IT's 3.55 I am on now. Just Awesome and great talk. Keep up the great work, Ben! You are giving gems to the community. Thanks man.

  • @detecht
    @detecht Před 17 dny +1

    That was super cool. Amazing work, Lupin. And the presentation was awesome. Thank you, Nahamsec!

  • @alientec258
    @alientec258 Před 16 dny +1

    Thank you so mutch Lupin for this awesome presentation .
    Ben thx for sharing , grateful for it my Friend

  • @harshil.
    @harshil. Před 16 dny

    Amazing presentation, whoever does the marketing/graphic design for Lupin is the 🐐

  • @1ko9
    @1ko9 Před 16 dny

    Thank you Lupin for this great presentation and Ben for sharing these great presantations with us!

  • @MarkFoudy
    @MarkFoudy Před 17 dny

    Thank you, Ben!

  • @breakoutgaffe4027
    @breakoutgaffe4027 Před 16 dny

    Great talk!

  • @zzzzzzzzZzZZzzzaZzz
    @zzzzzzzzZzZZzzzaZzz Před 16 dny

    that was a pretty cool Finding!
    especially the widespread vuln sounds interesting

  • @crusader_
    @crusader_ Před 17 dny

    The slides are very fun to watch

  • @user-dr9in3hw2e
    @user-dr9in3hw2e Před 15 dny

    Nice bro...@Nahamsec keep it up

  • @jannmoon
    @jannmoon Před 6 dny

    This is a good dude 🥂

  • @123454321pavel
    @123454321pavel Před 17 dny +1

    What was the impact of the last vulnerability? Attacker could bruteforce secrets of users via csrf?

  • @crusader_
    @crusader_ Před 17 dny +1

    Hell yeah

  • @KarahannAe
    @KarahannAe Před 13 dny

    11:06 this tool sounds really useful. Is there a link for it?

  • @normalitee0os
    @normalitee0os Před 7 dny

    How exactly is the SOP bypassed in the last vulnerability?

  • @Test-ny6uh
    @Test-ny6uh Před 17 dny

    #NahamCon2024

  • @cowid
    @cowid Před dnem

    SOP doesnt allow you to send requests cross-sites. In SOP there is the letter O, which stands for Origin. An origin is not a site, those are two different concepts. And by definition, SOP does not protect from CSRF. It protects from COW (Cross Origin Writes). I like the energy and the enthusiasm, we need that in the field, but if you want to present something and don't want to sound like you dont know what you're talking about, I would suggest you do your homework before. Thank you for sharing anyway.

    • @baraamansi7637
      @baraamansi7637 Před 16 hodinami

      Actually he is right , If the content-type was application/json this would be considered as not-simple request for the browser and would require a preflight request which would block the XS-search(Get based CSRF) request because its not a trusted origin

  • @trustedsecurity6039
    @trustedsecurity6039 Před 16 dny

    With all the ads around i've vomited... After a few minutes go full screen... I dont even understand why sponsor are needed on a Twitch stream but meh