Open in app

Sign In

Write

Sign In

Taha
Taha

37 Followers

Home

About

Published in

System Weakness

·Feb 6, 2022

The devil is in the details — Authentication Bypass

Hello, I’m Taha. Today, I’ll go over one of the vulnerabilities I was rewarded for last month. I hope you enjoy this write-up. How do magic links work? In a magic link workflow, the site or app asks users for an email address, not a password. Then, the application generates a link with an embedded…

Bug Bounty

2 min read

The devil is in the details [Authentication Bypass]
The devil is in the details [Authentication Bypass]
Bug Bounty

2 min read


Jun 4, 2021

XSS to Account Takeover

One of the hottest topics in today’s world is the gambling industry. Most of these websites use the same script. Therefore, if one of them is vulnerable, several million users could be at risk! 1 — Recon To begin with, I examined several pages on the website for vulnerabilities but did…

Bug Bounty

3 min read

XSS to Account Takeover — Gambling Sites
XSS to Account Takeover — Gambling Sites
Bug Bounty

3 min read

Taha

Taha

37 Followers

application security enthusiast 🥷🏻

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams