Open redirects: Easy to detect, Hard to fix

Introduction

Open redirects are pretty dangerous, not because of their impact but because of how easily they can be hidden. We will be exploring some general tips later on but first we need to explain what open redirects are.

The best way to do that in my experience is by example so we will again be building a lab and hacking it before we try to secure it. Open redirects happen when the application redirects the users but does not check the user is sent to the proper resource. Instead, no check is done and every malicious…

--

--

--

No b*llshit Hacking tutorials with extreme value in short bursts

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Aleph Zero: Token Sale Is Now Open — Check Below For Deposit Address And Instructions On How To…

Seeing Is Believing

Crypto War II: Birth of Decentralized System

How does a bounty hunter tackle a HackerLink bounty?

Event and Meeting Organizers As First Responders?

Phishing Attacks

Can Encrypted Messaging Be Safe, Inclusive, and Respect Human Rights?

Shade Protocol is an array of connected privacy-preserving DeFi applications built on Secret…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Thexssrat

Thexssrat

No b*llshit Hacking tutorials with extreme value in short bursts

More from Medium

I let automation hack for me: Here is what I learned

Weapons in my quiver: Tools and extension I use in bounties

Vulnerability Capstone — Tryhackme

Bug Bounty Methodology - Web Vulnerabilities Checklist