MENU

Fun & Interesting

Web Cache Poisoning: Hunting Methodology & Real-World Examples

Medusa 7,825 6 months ago
Video Not Working? Fix It Now

This video explores the Web Cache Poisoning vulnerability in detail. We'll cover essential concepts such as web caching, cache keys, cache hits, cache misses, and cache busters. You’ll also learn how to identify this vulnerability in web applications, complete with practical examples. By the end of the video, you’ll have a comprehensive understanding of all the key concepts related to web cache poisoning. . . . Blogs: https://medusa0xf.medium.com/ . . . Social media: Twitter: https://twitter.com/medusa_0xf . . . Discord: https://discord.com/invite/2PUPD3RHHs . . HackerOne Report https://hackerone.com/reports/1010858 . . . Introduction: 0:00 Caching: 0:26 CDN Caching [Cache Miss & Hit]: 0:44 Cache Key: 1:28 Recon: 2:17 Web Cache Poisoning: 3:00 Cache Buster: 4:28 Unkeyed & Keyed Input: 5:12 Hunting Methodology: 7:30 HackerOne Report: 9:38 Ending: 11:07 . . Like and Subscribe :) . . Music: Karl Casey @ White Bat Audio #api #owasp #portswigger #bugbounty #bola #postman #pentesting #api #hack #bola #tryhackme #hackerone #apihacking #computerscience #javascript #python #postman #ctf #bughunting #pentesting #hacking #hackingtools #burpsuite #portswigger #ethicalhacking #OAuth #webhacking #programming #websecurity #technology #practical #artificialintelligence #web #recon #bypass

Comment