NoRiskNoLive
@hw16
Penetration testing | Bug bounty
ID: 46911279
13-06-2009 16:09:13
3 Tweet
3 Followers
63 Following
Race Condition Led to Admin Takeover خطأ مبرمج سمح لنا نخترق حساب الادمن ! بالبدايه رجعت لكم بمقالة جديدة انا و Abdullah Angawi قبل مانبدا اغلبكم اكيد عارف وش هو الrace condition بس الي اغلبه مايعرف انه فيه نوع اسمه time-of-check to time-of-use طيب بسم الله خلونا بالبدايه
Finally, with NoRiskNoLive, we managed to bypass the Cloudflare mTLS protection after around 5 days of work. I'd like to share a few golden tips for bug bounty hunters who might face something similar in the future. But first, here's a quick summary: The target was a banking app with