Artwork
iconShare
 
Manage episode 478951480 series 3643227
Content provided by Amin Malekpour. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Amin Malekpour or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

A broken logout flow let attackers hijack accounts using just a user ID.
A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution.

This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences.

Chapters:

00:00 - INTRO

01:22 - FINDING #1 - The Logout That Logged You In

07:12 - FINDING #2 - From Signature Field to Shell Access

14:40 - OUTRO

Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us [email protected]
🔗 Podcast Website → Website Link

  continue reading

Chapters

1. INTRO (00:00:00)

2. FINDING #1 - The Logout That Logged You In (00:01:22)

3. FINDING #2 - From Signature Field to Shell Access (00:07:12)

4. OUTRO (00:14:40)

14 episodes