Updated: May 28, 2020
My earlier post on the webinar was good enough to get me to invite as a speaker for WAP Plymouth second event i.e QUEST 2.0. This time I decided to provide the audience with a more severe vulnerability which is P1/P2 on Bugcrowd taxonomy. So, my topic was HTTP Request Smuggling.
I found the audience was interested in this vulnerability as it would help them to be better at bug bounty and earn more. It was an amazing webinar and I even got good feedback from the audience.
Link to webinar: https://www.youtube.com/watch?v=Fz9CQCdqjNQ
In this webinar, I explained How this vulnerability works, how to find this vulnerability and exploit it!
I have attached my presentation and if you guys have any doubt do let me know on
Instagram page : bug_xs
See you soon!