Samia Akter (@incognito_sami) 's Twitter Profile
Samia Akter

@incognito_sami

𝓘 𝓯𝓮𝓵𝓵 𝓲𝓷 𝓵𝓸𝓿𝓮 𝔀𝓲𝓽𝓱 𝓬𝔂𝓫𝓮𝓻𝓼𝓮𝓬𝓾𝓻𝓲𝓽𝔂.👩🏻‍💻o(〃^▽^〃)o

ID: 1296084603497717761

calendar_today19-08-2020 14:04:06

377 Tweet

611 Followers

1,1K Following

Intigriti (@intigriti) 's Twitter Profile Photo

If you want to master API security, open this thread! APIs are used EVERYWHERE for applications to communicate, but let's see how you can HACK them! 👩‍💻 A Thread 🧵👇

Katie Paxton-Fear (@insiderphd) 's Twitter Profile Photo

The #1 confusion I get from new hackers is “I found an IDOR but the program has made it NA because I need the victims cookies” you have the victim and the attacker the wrong way round. You need to make requests on the victim account, replace the cookie with the attackers cookie,

Security Blue Team (@secblueteam) 's Twitter Profile Photo

You asked and we answered... Because of the interest in our merch, we've decided to run a giveaway! We're offering merch bundles to 10 lucky winners (items may vary to those shown). To enter: 🛡️ Follow us and CySec Careers 🛡️ Retweet this tweet Worldwide. Closes Jan 5, 2024

You asked and we answered...

Because of the interest in our merch, we've decided to run a giveaway! We're offering merch bundles to 10 lucky winners (items may vary to those shown). 

To enter:

🛡️ Follow us and <a href="/CysecCareers/">CySec Careers</a> 
🛡️ Retweet this tweet

Worldwide. Closes Jan 5, 2024
🇸🇦 ROOD | GOAT (@0x_rood) 's Twitter Profile Photo

1- Found login page 2- Intercept POST login request 3- Found parameter called config= 4- But Payload ../../../../../../../../../etc/passwd 5- Successfully read data and sorry it's path traversal not LFI #bugbounty #bugbountytips

1- Found login page
2- Intercept POST login request
3- Found parameter called config=
4- But Payload ../../../../../../../../../etc/passwd
5- Successfully read data

and sorry it's path traversal not LFI

#bugbounty #bugbountytips
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

🔐Bug Bounty Tips: How to Identify and exploit Akamai Cache Deception/Poisoning Issues? 1️⃣ Assuming you're navigating an Akamai site and spot headers like cdn-cache; desc=MISS or cdn-cache; desc=HIT or any other headers Indicating a cache HIT, you're in luck! 🍀 2️⃣

X (@themsterdoctor1) 's Twitter Profile Photo

Bug Bounty Tips!!! IDOR Steps to Reproduce 1.Go to https://example{.}com/ 2.Go to vendor login. 3.Make one attacker account and one victim account. 4.Login as attacker. 5.Go to My Account. 6.Update your profile and intercept your request with burp suite, make sure your foxy

Bug Bounty Tips!!! IDOR

Steps to Reproduce

1.Go to https://example{.}com/
2.Go to vendor login.
3.Make one attacker account and one victim account.
4.Login as attacker.
5.Go to My Account.
6.Update your profile and intercept your request with burp suite, make  sure your foxy
Muhammad Julfikar Hyder🇵🇸 (@thejulfikar) 's Twitter Profile Photo

Unveiling the Hidden: The Chatroom Message Retrieval Vulnerability - A Deep Dive into User Privacy and Data Security blog.beetles.io/2023/11/12/unv… #bugbountytips #bugbountytip #bugbounty #cybersecurity #infosec #ethicalhacking

Samia Akter (@incognito_sami) 's Twitter Profile Photo

Excited to announce that our team Federal_bonk_Investigations🇧🇩 achieved – 3rd position in the International CTF! 🏆 Grateful to my teammates for their dedication specially Kazi Ashikur Rahman vaiya🫡Thanks to Knight Squad for organizing a competitive contest. #ctf #cybersecurity #knightctf2024 #fbictf

Excited to announce that our team <a href="/fbictf/">Federal_bonk_Investigations🇧🇩</a> achieved – 3rd position in the International CTF! 🏆 Grateful to my teammates for their dedication specially <a href="/KaziBlackFox/">Kazi Ashikur Rahman</a> vaiya🫡Thanks to <a href="/kn16h75qu4d/">Knight Squad</a> for organizing a competitive contest. 
#ctf #cybersecurity #knightctf2024 #fbictf
Muhammad Julfikar Hyder🇵🇸 (@thejulfikar) 's Twitter Profile Photo

Privilege Escalation through ID Reflection thejulfikar.com/bug-bounty-wri… #bugbountytips #bugbountytip #bugbounty #cybersecurity #infosec #ethicalhacking #apipentesting #nodebb #pentesting

Bug Bounty Community Bangladesh (@bbcbd_official) 's Twitter Profile Photo

Congratulations to our Top 60 Hunters for making it to the Finale of HackerOne BUG HUNT 2024 - Bangladesh's Premier Cyber Security Competition & Conference! 🎉🎊 🔗More at bughunt.info #bughunt2024 #TheHuntIsOn #turnupthehype

Congratulations to our Top 60 Hunters for making it to the Finale of HackerOne BUG HUNT 2024 - Bangladesh's Premier Cyber Security Competition &amp; Conference! 🎉🎊

🔗More at bughunt.info

#bughunt2024 #TheHuntIsOn #turnupthehype
Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

We're excited to announce one of our giveaways thanks to "Caido" 🎉 We will pick 5 winners to win a 1-year Caido Pro license! To enter: 1️⃣ Follow us @BugBountyDefcon and Caido 2️⃣ Like this post ❤️ 3️⃣ Retweet this post 🔁 You have time to participate until Friday (9/13)!

$mit (@fabrikat0r) 's Twitter Profile Photo

Spent the last week reading 250+ IDOR reports on HackerOne 🕵️‍♂️ Now I’ve compiled 200+ easy-to-search IDOR test cases for beginners! Want the file? Comment IDOR & I’ll send it 💾 #BugBounty #CyberSecurity #IDOR #EthicalHacking #AppSec

Spent the last week reading 250+ IDOR reports on HackerOne 🕵️‍♂️
Now I’ve compiled 200+ easy-to-search IDOR test cases for beginners!
Want the file? Comment IDOR &amp; I’ll send it 💾
#BugBounty #CyberSecurity #IDOR #EthicalHacking #AppSec