Mustafa Adam Qamar El-Din’s Post

قال سبحانه و تعالى :-(وَعَلَّمَكَ مَا لَمۡ تَكُن تَعۡلَمُۚ وَكَانَ فَضۡلُ ٱللَّهِ عَلَیۡكَ عَظِیمࣰا) [النساء ١١٣] بتوفيق من الله سبحانه و تعالى ♥️ In the last three weeks, I had submitted three Security Vulnerabilities to Google Company :- 1- The First :- Accepted 2- The Second :- Triaged and under investigation . 3- The Third :- Closed as Duplicate (Duplicated by their bug tracking mechanism), The bug was :- Clickjacking vulnerability in sensitive functionality. - The vulnerabilities were in main Google assets ( : - Currently i can't disclose any information about the other two vulnerabilities, maybe after fix. #Tip :- Don't say oh this is a big company and its impossible that it can suffer from this specific type of vulnerability, And always remember that big companies are the most vulnerable ( : #bugbountytips #cybersecurity #security

  • No alternative text description for this image
Omar Ali

Penetration Tester | Bug Hunter | offensive Security Engineer | Software Engineer

6mo

Can you explain the clickjacking mechanism you use it , not disclosure any thing, just the tips of clickjacking, cause i want to know more about it . and you done an amazing work

Ali Essam ✅

Cybersecurity Expert | Founder & CEO of DragonMeta | Penetration Tester | Certified in eJPT, eWPTX, eCDFP, eCTHP, eCIR, AWS, ICCA | 450+ Vulnerabilities Discovered | Innovator in Gaming & Tech | 15k+ YouTube Subscribers

6mo

الف الف مبروووك ♥️

Rahmat Hidayat

Bug hunter | Ranked 1st on LinkedIn Bug bounty program

6mo

allahumma baarik

Bright Amankwah

Security researcher | IT support specialist at Ghana Broadcasting Corporation

6mo

Congratulations 👏🏽👏🏽

Mohammed Altigani

Fullstack Developer | Laravel - Vuejs | React - Nextjs

6mo

مشاء الله تبارك الرحمن

Chol THOK

Bug hunter | network security | Cybersecurity student | IT Support

6mo

الف مبروك يا برو 🎊

See more comments

To view or add a comment, sign in

Explore topics