
GabbyTech
@gabbytech01
Followers
837
Following
9K
Media
131
Statuses
4K
Security Researcher || Jr Penetration Tester || Ethical Hacker|| Security intern @teliytech https://t.co/ZIrZ1R2sGn
view my portfolio_cv 👉
Joined May 2023
Hmm. Is it possible for you guys to host something like an event, other than the normal space we usually have. Bug bounty hunting based, and you guys will share something like , what vuln/bug we should look into. and how we can hunt on programs and all. 👇.
2
3
16
RT @d3q0w: spent the whole of yesterday doing analysis on SQLi, read a lot of articles, reports and books. now I guess I don't have to go….
0
1
0
RT @0xHun73r: I was just testing some random parameters with a very simple payloads. Payload: .(parametr c=)'>"<svg%2Fonload=confirm("0xhun….
0
0
0
It was nice working with @cybergirl_io on Authentication vulnerability. we go again trying to get the end of it on Portswigger, buy solving and understanding the logic for the next 3labs.#30daysbugbountychallenge.
0
0
4
Reading report write-ups is part of being an hacker . Tonight I read another authentication bypass vulnerability, though is was 2019 report for Instagram on Hackerone (it was disclosed). Moving everyday.#30daysbugbountychallenge.
0
0
2
RT @gabbytech01: 1/30days.Today I started out with authentication vulnerability on Portswigger. Practiced it over and over, solving only 3….
0
3
0
1/30days.Today I started out with authentication vulnerability on Portswigger. Practiced it over and over, solving only 3 labs from it. Also I read a report on authentication from #MTN on #hackerone .#30daysbugbountychallenge
1
3
20
#30daysbugbountychallege starting today, who wanna join in and grow together with me. I am starting with Authentication Vulnerability and also read about 2-3 write-ups every single day on auth for the next 30days.
0
0
1
RT @4osp3l: Okay; this have been reported to their program on BC. the behavior is by design, meaning, they intentionally allow that, so t….
0
1
0
Read “Securing an Application Built with AI: Lessons from a Real-World Test“ by GABBYTECH on Medium:
medium.com
Artificial Intelligence (AI) applications are becoming more common across industries, from fintech to healthcare. While AI adds new…
0
2
3
•Apply role-based access controls (RBAC) to ensure each token is scoped to the correct permissions. •Regularly audit authentication and authorization mechanisms.Thank you :).@theXSSrat @xss0r.
0
0
2
Leakage.•Sensitive information (personal data, business records, financial details) could be accessed by unauthorized users. •One compromised token equals compromise of all accounts.3.Privilege Escalation.
1.Account Impersonation.•Any user with the shared token or API key can impersonate other users without needing their login credentials. •Access control becomes meaningless since identity cannot be verified properly. I already requote the rest kindly check it out 🙏.
1
0
4