<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Bug Bounty Hunting on Medium]]></title>
        <description><![CDATA[Latest stories tagged with Bug Bounty Hunting on Medium]]></description>
        <link>https://medium.com/tag/bug-bounty-hunting/latest?source=rss------bug_bounty_hunting-5</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Bug Bounty Hunting on Medium</title>
            <link>https://medium.com/tag/bug-bounty-hunting/latest?source=rss------bug_bounty_hunting-5</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 06 May 2026 18:30:34 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/tag/bug-bounty-hunting" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[ The Ultimate Bug Bounty Course: From Zero to Advanced Hacker 1]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@dasielramirezhernandez/the-ultimate-bug-bounty-course-from-zero-to-advanced-hacker-269160fa6518?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/2600/1*CFxiLcvB_w9I2qMcUKqh_A.png" width="2752"></a></p><p class="medium-feed-snippet">Volume 1, Post 1: Welcome to the Bug Bounty Universe</p><p class="medium-feed-link"><a href="https://medium.com/@dasielramirezhernandez/the-ultimate-bug-bounty-course-from-zero-to-advanced-hacker-269160fa6518?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@dasielramirezhernandez/the-ultimate-bug-bounty-course-from-zero-to-advanced-hacker-269160fa6518?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/269160fa6518</guid>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[bug-bounty-beginner]]></category>
            <category><![CDATA[web-security]]></category>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <dc:creator><![CDATA[Dasiel Ramirez Hernandez]]></dc:creator>
            <pubDate>Tue, 24 Mar 2026 17:48:00 GMT</pubDate>
            <atom:updated>2026-03-24T18:08:12.004Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Web Security Series #7 — Exploiting Blind SQL Injection via Session Cookies]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@laibakashif0011/web-security-series-7-exploiting-blind-sql-injection-via-session-cookies-8a82bc573211?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/1536/1*XhdfjXHfVnNnlRyQ8UKmtA.png" width="1536"></a></p><p class="medium-feed-snippet">SQL Injection is one of the most critical vulnerabilities in web applications. However, not all SQL Injection flaws are directly visible&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@laibakashif0011/web-security-series-7-exploiting-blind-sql-injection-via-session-cookies-8a82bc573211?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@laibakashif0011/web-security-series-7-exploiting-blind-sql-injection-via-session-cookies-8a82bc573211?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/8a82bc573211</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[web-application-security]]></category>
            <dc:creator><![CDATA[Laibakashif]]></dc:creator>
            <pubDate>Wed, 18 Mar 2026 10:03:26 GMT</pubDate>
            <atom:updated>2026-03-18T10:03:26.125Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Web Security Series #6 — Exploiting SQL Injection to Extract Sensitive Data]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@laibakashif0011/web-security-series-6-exploiting-sql-injection-to-extract-sensitive-data-26c5c11e4779?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/1536/1*HDLlWso9NLW0UoUn7pAOtg.png" width="1536"></a></p><p class="medium-feed-snippet">Injection vulnerabilities remain one of the most critical risks in web application security.</p><p class="medium-feed-link"><a href="https://medium.com/@laibakashif0011/web-security-series-6-exploiting-sql-injection-to-extract-sensitive-data-26c5c11e4779?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@laibakashif0011/web-security-series-6-exploiting-sql-injection-to-extract-sensitive-data-26c5c11e4779?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/26c5c11e4779</guid>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <category><![CDATA[web-penetration-testing]]></category>
            <dc:creator><![CDATA[Laibakashif]]></dc:creator>
            <pubDate>Tue, 17 Mar 2026 09:18:53 GMT</pubDate>
            <atom:updated>2026-03-17T09:18:53.304Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Web Security Series #5 — Exploiting Broken Access Control via Token Misuse in API Endpoints]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@laibakashif0011/web-security-series-5-exploiting-broken-access-control-via-token-misuse-in-api-endpoints-c0d89ceaadd1?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/1536/1*qRoMbFuvFQUHHN3B5sPgTw.png" width="1536"></a></p><p class="medium-feed-snippet">Access control mechanisms are essential for ensuring that users can only perform actions that they are authorized to execute. When these&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@laibakashif0011/web-security-series-5-exploiting-broken-access-control-via-token-misuse-in-api-endpoints-c0d89ceaadd1?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@laibakashif0011/web-security-series-5-exploiting-broken-access-control-via-token-misuse-in-api-endpoints-c0d89ceaadd1?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/c0d89ceaadd1</guid>
            <category><![CDATA[web-application-security]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <dc:creator><![CDATA[Laibakashif]]></dc:creator>
            <pubDate>Mon, 16 Mar 2026 14:32:42 GMT</pubDate>
            <atom:updated>2026-03-16T14:32:42.445Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Web Security Series #4 — Discovering Unauthorized Resources via IDOR (Burp Suite & ffuf)]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@laibakashif0011/web-security-series-4-discovering-unauthorized-resources-via-idor-burp-suite-ffuf-bd878726f8a2?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/1536/1*yS-OuQ8t907tywue3T_5UQ.png" width="1536"></a></p><p class="medium-feed-snippet">Access control mechanisms are a fundamental component of web application security. When implemented incorrectly, they can allow attackers&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@laibakashif0011/web-security-series-4-discovering-unauthorized-resources-via-idor-burp-suite-ffuf-bd878726f8a2?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@laibakashif0011/web-security-series-4-discovering-unauthorized-resources-via-idor-burp-suite-ffuf-bd878726f8a2?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/bd878726f8a2</guid>
            <category><![CDATA[web-application-security]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Laibakashif]]></dc:creator>
            <pubDate>Sun, 15 Mar 2026 16:45:35 GMT</pubDate>
            <atom:updated>2026-03-15T16:45:35.958Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Web Security Series #3 — Discovering Credentials Using Cluster Bomb Attacks (Burp Suite & ffuf)]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@laibakashif0011/web-security-series-3-discovering-credentials-using-cluster-bomb-attacks-burp-suite-ffuf-a2dc4bb6ebc3?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/1536/1*AlMuBWIpxhbSZclKyFgYTQ.png" width="1536"></a></p><p class="medium-feed-snippet">Authentication mechanisms are a critical component of web application security. However, weak credential management and insufficient&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@laibakashif0011/web-security-series-3-discovering-credentials-using-cluster-bomb-attacks-burp-suite-ffuf-a2dc4bb6ebc3?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@laibakashif0011/web-security-series-3-discovering-credentials-using-cluster-bomb-attacks-burp-suite-ffuf-a2dc4bb6ebc3?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/a2dc4bb6ebc3</guid>
            <category><![CDATA[web-application-security]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <dc:creator><![CDATA[Laibakashif]]></dc:creator>
            <pubDate>Sat, 14 Mar 2026 18:06:12 GMT</pubDate>
            <atom:updated>2026-03-14T18:06:12.431Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Web Security Series #2 — Bypassing Authentication via MFA Tampering (Second-Factor Replay Attack)]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@laibakashif0011/web-security-series-2-bypassing-authentication-via-mfa-tampering-second-factor-replay-attack-ddb578f6ffc3?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/1576/1*j7iNbCRXLZzyAAGCJgGQUw.png" width="1576"></a></p><p class="medium-feed-snippet">Multi-Factor Authentication (MFA) is widely used to strengthen authentication mechanisms by requiring users to verify their identity using&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@laibakashif0011/web-security-series-2-bypassing-authentication-via-mfa-tampering-second-factor-replay-attack-ddb578f6ffc3?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@laibakashif0011/web-security-series-2-bypassing-authentication-via-mfa-tampering-second-factor-replay-attack-ddb578f6ffc3?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/ddb578f6ffc3</guid>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[web-application-security]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <dc:creator><![CDATA[Laibakashif]]></dc:creator>
            <pubDate>Fri, 13 Mar 2026 14:55:26 GMT</pubDate>
            <atom:updated>2026-03-13T14:55:26.179Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[A Simple P4 Bug That Ended as Duplicate]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://bugwraith.medium.com/a-simple-p4-bug-that-ended-as-duplicate-4cb0c4ca75b2?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/600/1*I_n39yr8gqwYIkqns_CcZg.png" width="600"></a></p><p class="medium-feed-snippet">Bug bounty hunting has a funny way of humbling you.</p><p class="medium-feed-link"><a href="https://bugwraith.medium.com/a-simple-p4-bug-that-ended-as-duplicate-4cb0c4ca75b2?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://bugwraith.medium.com/a-simple-p4-bug-that-ended-as-duplicate-4cb0c4ca75b2?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/4cb0c4ca75b2</guid>
            <category><![CDATA[p4-bugs]]></category>
            <category><![CDATA[stored-html-injection]]></category>
            <category><![CDATA[duplicate]]></category>
            <category><![CDATA[pentrationtesting]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <dc:creator><![CDATA[BugWraith (Lokesh)]]></dc:creator>
            <pubDate>Thu, 12 Mar 2026 18:11:47 GMT</pubDate>
            <atom:updated>2026-03-12T18:11:47.196Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[The Bug Bounty Hunter Roadmap (2026): From Curious Beginner to Real Vulnerability Finder]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@bugitrix/the-bug-bounty-hunter-roadmap-2026-from-curious-beginner-to-real-vulnerability-finder-6605198b820c?source=rss------bug_bounty_hunting-5"><img src="https://cdn-images-1.medium.com/max/851/0*oPKJkkcyjvXAjPlW" width="851"></a></p><p class="medium-feed-snippet">The Hacker Dream Most People Get Wrong</p><p class="medium-feed-link"><a href="https://medium.com/@bugitrix/the-bug-bounty-hunter-roadmap-2026-from-curious-beginner-to-real-vulnerability-finder-6605198b820c?source=rss------bug_bounty_hunting-5">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@bugitrix/the-bug-bounty-hunter-roadmap-2026-from-curious-beginner-to-real-vulnerability-finder-6605198b820c?source=rss------bug_bounty_hunting-5</link>
            <guid isPermaLink="false">https://medium.com/p/6605198b820c</guid>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[bug-bounty-roadmap]]></category>
            <category><![CDATA[bug-bounty-hunting]]></category>
            <category><![CDATA[learning-cybersecurity]]></category>
            <category><![CDATA[web-application-security]]></category>
            <dc:creator><![CDATA[Bugitrix]]></dc:creator>
            <pubDate>Wed, 11 Mar 2026 08:12:14 GMT</pubDate>
            <atom:updated>2026-03-11T08:12:14.531Z</atom:updated>
        </item>
    </channel>
</rss>