Bug Bounty — Advanced Manual Penetration Testing Leading to Price Manipulation Vulnerability

Image for post
Image for post

INTRODUCTION

Image for post
Image for post
Figure 1: Request Vulnerable to Price Manipulation
Image for post
Image for post
Figure 2: JS code to generate token

CONCLUSION:

Ethical Hacker | Bug Bounty Hunter | Freelancer

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store