Sagar Bhong - Profile | Com Olho

Sagar Bhong

sagarbhong8845
Last Login: Sat, 23 Nov 2024 10:35:51
Gender: Male
Age: 18-30
Hacking Level: Advance
Top 5%
Qualification: Graduation
Status: Employed

Bug Bounty Status Distribution

Vulnerability Types

Journey

Sat, Aug 03, 2024

Joined Community

Joined the community for the first time. Welcome to Com Olho!

07:06 PM

Com Olho

Sun, Aug 04, 2024

First CTF Submitted

First CTF Submitted: Base64 Decoding

09:16 AM

Com Olho

Sun, Aug 04, 2024

First Bug Bounty Report

First Bug Bounty Report: Exam Prep Tool Security Research Reward

08:12 PM

Exam Prep Tool

Sun, Aug 04, 2024

First Rewarded Bug Bounty

First Rewarded Bug Bounty: Exam Prep Tool Security Research Reward

08:12 PM

Exam Prep Tool

Tue, Aug 06, 2024

First Coordinated Program Submission

First Coordinated Program Submission

10:17 AM

aavas.in

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Web Vulnerability Scanners Network Analysis Tools Penetration Testing Frameworks Exploit Development Tools Wireless Hacking Tools Other
Hacking Interest
  • Website APIs
Learning Goals
  • Improve Skills Gain certifications Advance Career Other
Learning Style
  • Reading Watching Videos Hands on labs Webinars
Security Focus
  • Offensive Security Defensive Security Compliance
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Severity Vulnerability Type Status
August 04, 2024 Exam Prep Tool Security Research Reward P2 insecure_direct_object_references View Certificate
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.

CTF Submitted Successfully

This graph shows the distribution of vulnerability types in successfully submitted CTFs.

CTF Submitted Successfully
Coordinated Submissions

This graph shows the status of coordinated submissions (Accepted/Rejected).

Coordinated Submissions