gabbytech01 Profile Banner
GabbyTech Profile
GabbyTech

@gabbytech01

Followers
837
Following
9K
Media
131
Statuses
4K

Security Researcher || Jr Penetration Tester || Ethical Hacker|| Security intern @teliytech https://t.co/ZIrZ1R2sGn

view my portfolio_cv 👉
Joined May 2023
Don't wanna be here? Send us removal request.
@gabbytech01
GabbyTech
20 days
Hmm. Is it possible for you guys to host something like an event, other than the normal space we usually have. Bug bounty hunting based, and you guys will share something like , what vuln/bug we should look into. and how we can hunt on programs and all. 👇.
2
3
16
@gabbytech01
GabbyTech
4 hours
RT @d3q0w: spent the whole of yesterday doing analysis on SQLi, read a lot of articles, reports and books. now I guess I don't have to go….
0
1
0
@grok
Grok
10 days
Join millions who have switched to Grok.
228
430
3K
@gabbytech01
GabbyTech
4 hours
RT @0xHun73r: I was just testing some random parameters with a very simple payloads. Payload: .(parametr c=)'>"<svg%2Fonload=confirm("0xhun….
0
0
0
@gabbytech01
GabbyTech
4 hours
It was nice working with @cybergirl_io on Authentication vulnerability. we go again trying to get the end of it on Portswigger, buy solving and understanding the logic for the next 3labs.#30daysbugbountychallenge.
0
0
4
@gabbytech01
GabbyTech
12 hours
Reading report write-ups is part of being an hacker . Tonight I read another authentication bypass vulnerability, though is was 2019 report for Instagram on Hackerone (it was disclosed). Moving everyday.#30daysbugbountychallenge.
0
0
2
@gabbytech01
GabbyTech
12 hours
RT @gabbytech01: 1/30days.Today I started out with authentication vulnerability on Portswigger. Practiced it over and over, solving only 3….
0
3
0
@gabbytech01
GabbyTech
19 hours
1/30days.Today I started out with authentication vulnerability on Portswigger. Practiced it over and over, solving only 3 labs from it. Also I read a report on authentication from #MTN on #hackerone .#30daysbugbountychallenge
Tweet media one
Tweet media two
Tweet media three
1
3
20
@gabbytech01
GabbyTech
1 day
#30daysbugbountychallege starting today, who wanna join in and grow together with me. I am starting with Authentication Vulnerability and also read about 2-3 write-ups every single day on auth for the next 30days.
0
0
1
@gabbytech01
GabbyTech
2 days
Starting a #30daysbugbounty challenge.learning all about Authentication flaws.>>>>.
1
0
5
@gabbytech01
GabbyTech
2 days
RT @4osp3l: Okay; this have been reported to their program on BC. the behavior is by design, meaning, they intentionally allow that, so t….
0
1
0
@gabbytech01
GabbyTech
2 days
what are you working on?. lets keep grinding.
Tweet media one
0
0
5
@gabbytech01
GabbyTech
2 days
Read “Securing an Application Built with AI: Lessons from a Real-World Test“ by GABBYTECH on Medium:
Tweet card summary image
medium.com
Artificial Intelligence (AI) applications are becoming more common across industries, from fintech to healthcare. While AI adds new…
0
2
3
@gabbytech01
GabbyTech
2 days
•Apply role-based access controls (RBAC) to ensure each token is scoped to the correct permissions. •Regularly audit authentication and authorization mechanisms.Thank you :).@theXSSrat @xss0r.
0
0
2
@gabbytech01
GabbyTech
2 days
Recommendation.•Implement unique Bearer tokens per session, tied to user identity, with proper expiration and refresh logic. •Generate user-specific API keys instead of using a shared/static key.
1
0
0
@gabbytech01
GabbyTech
2 days
fines, or compensation claims. •Reputation damage: News of weak security can discourage potential clients or investors. •Operational disruption: Exploits of this flaw may force downtime, re-authentication of all users, and emergency patches.
1
0
0
@gabbytech01
GabbyTech
2 days
•This could result in legal liabilities and fines if customer data is leaked. Business Impact.•Loss of customer trust: Users expect their accounts and data to be isolated and secure. •Financial loss: Data breaches or unauthorized access can lead to fraud,.
1
0
0
@gabbytech01
GabbyTech
2 days
•If tokens are shared across different roles (e.g., Admin vs. User), a regular user could perform admin-level operations. 4.Regulatory & Compliance Violations.•Lack of proper authentication controls can lead to non-compliance with standards like GDPR, HIPAA, or PCI DSS.
1
0
0
@gabbytech01
GabbyTech
2 days
Leakage.•Sensitive information (personal data, business records, financial details) could be accessed by unauthorized users. •One compromised token equals compromise of all accounts.3.Privilege Escalation.
@gabbytech01
GabbyTech
2 days
1.Account Impersonation.•Any user with the shared token or API key can impersonate other users without needing their login credentials. •Access control becomes meaningless since identity cannot be verified properly. I already requote the rest kindly check it out 🙏.
1
0
4
@gabbytech01
GabbyTech
2 days
1.Account Impersonation.•Any user with the shared token or API key can impersonate other users without needing their login credentials. •Access control becomes meaningless since identity cannot be verified properly. I already requote the rest kindly check it out 🙏.
0
0
1
@gabbytech01
GabbyTech
2 days
•This means authentication is not account-specific, and the system is likely using a static/shared credential instead of generating unique tokens tied to individual sessions or users. Security Risks.
1
0
0