PinnedEmanuel Beni HarijantoWhy You Should Always Check The Audit Log [Medium] — $500In this write-up, I will discuss how I was able to find sensitive information through the Audit Log on a well-known CyberSecurity Company.4 min read·May 20, 2023--1--1
PinnedEmanuel Beni HarijantoPrivilege Escalation from Improper Access Control [Medium] — $700I will be discussing how I was able to leverage an Improper Access Control Vulnerability to a Privilege Escalation Vulnerability on one…4 min read·Feb 23, 2021--1--1
Emanuel Beni HarijantoStrict Rate Limiting Policy Leads to Massive DoSI will be discussing an interesting observation on how policies implemented on Auth Endpoint could backfire and turn into massive DoS…4 min read·Feb 8, 2021----
Emanuel Beni HarijantoStored XSS on Product Description [HIGH] — $400In this writeup, I will be explaining to you readers how I was able to find a Stored XSS on one of the biggest E-commerce sites in Asia…3 min read·Jan 6, 2021----
Emanuel Beni HarijantoChoosing the ‘Right’ Bug Bounty ProgramThe bug bounty industry can be considered as one of the most competitive industries. The combination of evolving technologies as well as…4 min read·Dec 27, 2020----
Emanuel Beni HarijantoCross-Site Request Forgery (CSRF) Complete Guide with ExamplesCross-Site Request Forgery (CSRF) was one of the first vulnerabilities that I learned at the beginning of my Bug Bounty journey. Combined…5 min read·Oct 8, 2020--1--1
Emanuel Beni HarijantoFirst Valid Bug Bounty Submission — Information LeakageIntroduction to Bug Bounty along with First Valid Submission4 min read·Aug 26, 2020----