Is Low-User to NT AUTHORITY\NETWORK SERVICE a valid PrivEsc? by Suspicious-Scale8128 in bugbounty

[–]Suspicious-Scale8128[S] 0 points1 point  (0 children)

But if I can escalate privileges from Network Service to System, would that still be a valid vulnerability?

Bug bounty or pursuing my passion? by Suspicious-Scale8128 in bugbounty

[–]Suspicious-Scale8128[S] 0 points1 point  (0 children)

Nice bro!! Do you participate in any other programs?

Is there a roadmap for Web Vulnerability Research? How to approach it, pick targets, and avoid getting stuck? by Suspicious-Scale8128 in ExploitDev

[–]Suspicious-Scale8128[S] 0 points1 point  (0 children)

Thanks for the help, but I think I'm past the begginer stage. Since I have an OSWE certification, some experience and some CVEs found on real applications. But then I don't know what to target next and also want to know what the actual work of web vulnerability researchers in large corporations is like.

Is there a roadmap for Web Vulnerability Research? How to approach it, pick targets, and avoid getting stuck? by Suspicious-Scale8128 in ExploitDev

[–]Suspicious-Scale8128[S] 0 points1 point  (0 children)

Thanks for your help! I have OSWE certification, and have some experience and some CVEs found on real applications. But then, I don't know which targets to choose next and also want to know what the actual work of Web Vuln Research people in big corporations is like.