irahulmali Profile Banner
Rahul Mali Profile
Rahul Mali

@irahulmali

Followers
372
Following
2K
Media
144
Statuses
735

Here to connect with people, share thoughts and learn. Cyber Security Enthusiast | Web & API Security | CTF Player 👨🏻‍💻 Live Long and Prosper 🖖

Joined August 2016
Don't wanna be here? Send us removal request.
@irahulmali
Rahul Mali
2 years
"I have become root, the hacker of admin panel." 🕵️ #Oppenheimer #CyberSecurity #BugBounty #PenetrationTesting #documentation #developer #pentester
0
0
5
@irahulmali
Rahul Mali
6 hours
Truth has been spoken.
@BourAbdelhadi
Bour Abdelhadi
11 hours
@Dmytro520473 They sell you courses by promising that you can make a lot of money from BB programs, but the reality is very different. You only get better by learning the fundamentals and building real skills, and that takes time and effort.
0
0
0
@irahulmali
Rahul Mali
4 months
Hey @grok, based on your analysis of the last 365 days, list in sequence 10 accounts that frequently visit my profile. Do not mention the person, only @.username and the rate of visits to the profile per month.
1
0
0
@irahulmali
Rahul Mali
6 months
0
0
14
@irahulmali
Rahul Mali
9 months
Easy to grasp approach for API Testing by @InsiderPhD on @apisecu's #APISECCON #BugBounty #BugBountyTips
0
0
3
@irahulmali
Rahul Mali
11 months
2/2 In above case, OTP was sent to user's email but final POST request was made to an API endpoint without any security checks. So you could simply make a POST request to that endpoint with anyone's email and update it.
0
0
3
@irahulmali
Rahul Mali
11 months
1/2 Let's say you have a password reset functionality which is multi-step like, 1. Sending an OTP or reset token. 2. Verifying OTP or reset token. 3. Entering New Password and updating it. Now each of these steps might be bypass-able.
1
0
3
@irahulmali
Rahul Mali
11 months
In multi-step processes, try to bypass each step. Often developers forget or implement weak security in final steps. In following case, developer implemented no security in final step to reset password. #bugbountytips #cybersecurity #bugbounty #APISecurity #passwordreset
1
7
73
@irahulmali
Rahul Mali
1 year
Inspirational ✨
@brank0x42
Brank0x42
1 year
@HackenProof Nope. I started learning and web hacking at age of 37. My previous day time job was related to logistics sector and all of my learning and hacking was happening in my free time. At age of 43 I got a junior web appllication penetration tester job. So dream big and work hard. 😃🤘
1
0
1
@irahulmali
Rahul Mali
1 year
Last time when P1 was duped. #BugBounty #cybersecurity
0
1
49
@irahulmali
Rahul Mali
1 year
What #reels, #shorts and #doomscrolling is doing to us is creating amnesia of sorts. Scroll 10 reels and you won't remember the first one.
0
0
0
@irahulmali
Rahul Mali
2 years
1
1
5
@irahulmali
Rahul Mali
1 year
0
0
1
@irahulmali
Rahul Mali
1 year
When I ask myself everyday why I chose #BugBounty?
0
0
4
@irahulmali
Rahul Mali
2 years
0
0
9
@irahulmali
Rahul Mali
2 years
Can someone explain what the revenue model for conferences is? #cybersecurity #technology #Conference #infosec
1
0
2
@irahulmali
Rahul Mali
2 years
Time has come.
0
1
18
@irahulmali
Rahul Mali
2 years
Okay BBHs, that's how they design "secure" systems. Go!!! #cybersecurity #BugBounty #bugbountytips
@alexxubyte
Alex Xu
2 years
How do we design a secure system? Designing secure systems is important for a multitude of reasons, spanning from protecting sensitive information to ensuring the stability and reliability of the infrastructure. As developers, we should design and implement these security
0
0
1
@irahulmali
Rahul Mali
2 years
CVE-2024-3094 incident is exactly like that episode in Mr. Robot where Mobely creates a fake Wikipedia profile of Elliot as an entrepreneur because he has gained editor privileges over the years by editing articles. @whoismrrobot #xz #CyberSecurity #Linux
0
1
10
@irahulmali
Rahul Mali
2 years
1
0
12