Explore tweets tagged as #broken_access_control
@_nnxxrr_
NXR🇮🇩
3 days
I will be a speaker here, discussing broken access control issues based on my experience.
Tweet media one
7
5
110
@CtPrecious
Tech Enthusiast
1 month
VULSCANNER - Web Security Scanner . This tool automates comprehensive web app security checks - including SQL Injection, XSS, broken access control, missing security headers - and includes powerful OSINT lookup! . #OSINT.#Cybersecurity
Tweet media one
16
198
1K
@gregxsunday
Bug Bounty Reports Explained
2 months
Fuzzing vs broken access control bugs feat. @arthurair_es #bugbounty #bugbountytips #bugbountyhunter
0
3
49
@shivangmauryaa
Shivang
2 months
🚨 Broken Access Control - Role Change Exploit 🚨.I found a Broken Access Control vulnerability that allows a normal user to remove an Owner from the system by manipulating the role change request. 🔍 Steps to Reproduce:. 1/
Tweet media one
3
7
200
@KirollosBotros1
ARION
2 months
How broken access control vulnerabilities are closed as out of scope and informative,. I started to suffer @intigriti
Tweet media one
Tweet media two
2
0
22
@s_a_s__a_
0x4D4!🇪🇬 🇵🇸
23 days
لسه بدء اذاكر Broken Access Control فحبب اشير بعض ال Notes ممكن حد يستفاد او يكون عندي خطاء وحد شافه يعرفني. ---.ودي شوية ملاحظات كتبتها بعد ما حلت لاب رقم 5 علي PortSwigger وهي عن ال X-Original-URL وازاي تقدر تعرف انه موجود وتستغله. لنك اللاب:.
Tweet media one
2
3
27
@R3_VEAL
R3VEAL
4 months
I’m thrilled to share that a critical bug I reported has been officially resolved by the @USDOD 🦅🇺🇸. Where, just for PoC I was able to exfiltrate 72+ users sensitive information including address and payment info!🚨. 🔍Bug: Broken Access Control (BAC). #BugBounty #CyberSecurity
Tweet media one
0
2
24
@bountywriteups
𝕏 Bug Bounty Writeups 𝕏
24 hours
Bug Bounty Broken Access Control: la vulnerabilidad que abre más puertas de las que imaginas. #bugbounty #bugbountytips #bugbountytip.
1
5
13
@OreoB1scuit
Biscuit
2 months
story of how i found Broken Access Control In @geeksforgeeks . #bugbounty #bugbountyhunting
Tweet media one
0
8
40
@h1Disclosed
H1 Disclosed - Public Disclosures
3 months
⚡ Broken Access Control (IDOR) in Booking Detail and Bids Could Leads to Sensitive Information Disc. 👨🏻‍💻 back2arie ➟ Bykea .🟥 High.💰 None.🔗 #bugbounty #bugbountytips #cybersecurity #infosec
Tweet media one
0
5
42
@wadgamaraldeen
Mustafa Adam Gamaraldin Abdalla
2 months
Thanks to Allah♥️. Thousands Users PIIs leaked due to Broken Access Control at Discourse API. - Accepted.- Public BBP. # Tips and bug details : in the rest tweet thread :-. #bugbountytips .#CyberSecurity
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
9
121
@nader_3bnaser
نـــــــادِر
4 days
Broken Access control playlist.ليست كويسة لقيتها صدفة بس فيها تقريبا كل مايخص الثغرة.
1
1
16
@ghost__man01
SIDDHANT SHUKLA
2 days
*Broken Access Control* marked as Duplicate on @Hacker0x01, write-up will be published soon on @Medium .#BugBounty #bugbountytips #bugbountytip #hackerone #togetherwehitharder #cybersecurity #appsec #infosec #PenetrationTesting.
1
0
12
@bountywriteups
𝕏 Bug Bounty Writeups 𝕏
11 days
Broken Access Control: The Gateway to Unauthorized Privilege Escalation. #bugbounty #bugbountytips #bugbountytip.
0
2
6
@InstaSafe
InstaSafe
22 days
🚫 What is Broken Access Control?.It’s when users gain unauthorized access to data or actions they shouldn't. A top cause of .data leaks in apps. 🔐 Learn how to identify & prevent this critical flaw: #AccessControl #AppSecurity #CyberSecurity #InstaSafe.
0
0
0
@Burp_Suite
Burp Suite
4 months
🧠 Use Burp Scanner’s new AI capabilities to reduce false positives starting with Broken Access Control!
0
3
41
@Teye_03
𝓣𝓮𝔂𝓮...........
3 days
🔐 Broken Access Control (Part 2) – Path / Directory Traversal. Attackers exploit weak access checks to move through files & directories they shouldn’t touch. 🚨. 🛠️ Labs I worked on:.1️⃣ Bypassing absolute path checks → Jump outside intended folder (. /. /etc/passwd). 2️⃣.
0
0
3
@cedranetwork
Cedra
15 days
Move Modules 101. In Move, modules are the core building blocks of your smart contracts — and once deployed on-chain, they’re immutable, enforcing rules that can’t be broken. Learn about:. - Module addresses & namespaces.- Visibility & access control.- Registry & capability
Tweet media one
2
13
34
@logisekict
Logisek
6 months
#Broken #Access #Control: The Silent #Security #Threat. Access control is the foundation of application security, ensuring users operate within their intended permissions. Yet, 94% of applications tested revealed some form of Broken Access Control, making it the most common
Tweet media one
0
1
2
@darkshadow2bd
DarkShadow
4 months
⚡While reading Js files, I discovered a Broken Access Control vulnerability!. I found some hard-coded URLs with tokens related to the dashboard😁. Initially, access was denied without a token—but once I used the token… BOOM!💥. Full dashboard access without any authentication💯
Tweet media one
Tweet media two
Tweet media three
3
8
82