Ha$h1m
search
⌘Ctrlk
Bugcrowd Profile
Ha$h1m
  • 💲/dev/null
  • circle-dollarBug Bounty
    • square-downApplication-Level DoS
    • wine-glass-crackBroken Access Control
    • 8IDORs
    • wine-glass-crackLogic Bugs
    • stairsPrivilege Escalations
  • pooVDPs
  • codeAPPs
    • flask-round-poisonWeb Vulnerable LABs
  • booksAll Articles
    • 🔥Some Privilege Escalations + Logic Flaws Led to (DoS, Organization Takeover & more)
    • 🟥Exploiting the Authentication Flow to Block Any User from Logging In/Resetting Password + An IDOR
    • 🟧Logic flaw k1lled business messaging for all users
    • 🔥H4ck1ng the Same App for a Month -> $$$$
    • 🟩Logic flaw led to a $$$ privilege escalation
    • 🟩Is It Just About Replacing IDs? (I Guess Yes)
    • 🟧Logic flaw led to PrivEsc: I used a feature to bypass a restriction
    • 🟧I'm in love with Privilege Escalations!
    • 🟩Easy $$$ from PrivEsc: Hacking the Hidden Feature
    • 🟩From N/A to $$$: A Simple Python Script Led to Application-Level DoS
    • 🟧Hacking E-Commerce For $$$: IDOR and More
    • 🟥Logic Flaw: I Can Block You from Accessing Your Own Account
    • 🟥How Easily I Found My First P2 on Bugcrowd
    • 🟩An Easy RACE CONDITION That Made Me Fame
    • 🏴‍☠️0xhashimRESETriddle: Vulnerable Web Application
    • 🟩How I Found My First Bug Through Simple Fuzzing
    • hashimXSS
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. circle-dollarBug Bounty

square-downApplication-Level DoS

Make an app cry by overloading it—one request at a time.

hashtag
Recent

🔥Some Privilege Escalations + Logic Flaws Led to (DoS, Organization Takeover & more)chevron-right🟩From N/A to $$$: A Simple Python Script Led to Application-Level DoSchevron-right

Previous/dev/nullchevron-leftNextBroken Access Controlchevron-right

Last updated 1 month ago