What age did you start hacking? Do you have a favourite type of bug or vulnerability to hack?
Samuel: I started learning about hacking in my university years around the age of 23. I love serverside vulnerabilities such as Server-Side Request Forgery (SSRF), Server-Side Template Injection (SSTI) or code injection bugs.
How do you keep up to date on the latest hacking techniques, tools and vulnerability types?
Samuel: I did take a lot of certifications such as Offensive Security Certified Professional (OSCP) and Offensive Security Certified Expert (OSCE) for example, and I read a lot of blogs, including Chinese, South Korean and Russian security blogs (I do not want to miss any information).
Do you remember when you found your first bug? What was the type of bug? How did it feel to find it?
Samuel: My first bounty in HackerOne was from Zomato. It was a SQL injection (SQLi) in a cookie. On Saturdays, I usually spend my time doing physical activities, but on that particular day, I was sick with the flu. Since I am a person that cannot sit still, I decided to start hacking (not advisable!). I decided to try weird stuff and start fuzzing weirdly named cookies. I was shocked that it actually worked. The moral of the story is that if you never try, you will never know!
Denne historien er fra June 2020-utgaven av HWM Singapore.
Start din 7-dagers gratis prøveperiode på Magzter GOLD for å få tilgang til tusenvis av utvalgte premiumhistorier og 9000+ magasiner og aviser.
Allerede abonnent ? Logg på
Denne historien er fra June 2020-utgaven av HWM Singapore.
Start din 7-dagers gratis prøveperiode på Magzter GOLD for å få tilgang til tusenvis av utvalgte premiumhistorier og 9000+ magasiner og aviser.
Allerede abonnent? Logg på
Should I Buy Cyberinsurance?
Personal cyberinsurance covers a range of cybercrimes such as cyber extortion, cyberbullying, online fraud, and data loss.
Quick Tips: Five Things To Do If You Get Hacked
It might seem like an obvious choice at first, but many people often resort to panic-clicking device options, rebooting, Googling for solutions, calling tech support (or that tech-savvy friend) for help, all while leaving the compromised device connected.
CLASH OF THE EXECUTIVE SALOONS: BMW 5201 VS MERCEDES-BENZ E200
The BMW 5 series and Mercedes-Benz E-Class are motoring institutions.
SENNHEISER TULLAMORE FACTORY TOUR: HOW THE WORLD'S BEST HEADPHONES ARE MADE IN IRELAND
It’s a relatively common practice for brands to have separate facilities for parts manufacturing and product assembly, whether it’s for cost or other reasons.
Tech Awards 2024 Readers' Choice
BEST OF PERSONAL COMPUTING
Good For Nothing
After a rocky start with the Nothing Phone (1), the company turned things around by releasing the incredible Nothing Phone (2).
A For Affordable AI
The Google Pixel 8a has arrived, offering many features from its flagship siblings at a more affordable price. It maintains a sleek, compact design, making it easy to handle with one hand.
Mercedes Benz EQS SUV
Mercedes-Benz's adoption of electricity has been impressively rapid.
5 Steps To Secure Your Home With A Mesh Network
Firewalls filter data in network traffic to protect the network from a wide variety of malicious attacks and malware.
The Best Hair Straightener
When I first saw the Dyson Airstrait straightener, my immediate feelings were one of cautious optimism.