-
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :) https://netsec.expert/2020/02/01/xss-in-2020.html …
#bugbountytips pic.twitter.com/Mdygq1PI9Z
-
==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them. https://medium.com/@inonst/31-tips-api-security-pentesting-480b5998b765 …
#bugbountytips -
Look what I found on
@LinkedIn
Have fun my friends, BUG OUT.
#CyberSecurity#Security#BugBountyTip#bugbountytips#Hackers#SecurityResearcher#TheCyberSecurityHubpic.twitter.com/8oCpnkRIly
-
Steps 0) Login in with Twitter 1) Host Header Injection [to a.cxx] 2) Generate OAuth Token's Link 3) Send link to Victim, after victim authorize 4) Verifier send to a.cxx 5) Reuse use token Account Takeover by
@ngalongc#bugbountytips#bugbountytiphttps://hackerone.com/reports/317476 -
I just got a fancy idea to create strings in
#javascript without using dangerous characters
Inspired by @garethheyes challenge from@WebSecAcademy.#bugbountytips#xsspic.twitter.com/GiAe0REwLI
Prikaži ovu nit -
#bugbountytips Some lesser known 0-click XSS vectors: <object data="data:text/html,<script>alert(5)</script>"> <iframe srcdoc="<svg onload=alert(4);>"> <object data=javascript:alert(3)> <iframe src=javascript:alert(2)> <embed src=javascript:alert(1)> -
Got my first remote code execution on bug bounty program.Nothing is more beautiful than...... Tip? Just keep scanning for hidden directory until you found something else.
#bugbountytips pic.twitter.com/VWJe8wIxLs
Prikaži ovu nit -
6000 hackerone disclosed reports at one place. http://sec.eddyproject.com/6000-hackerone-disclosed-reports/ …
#hacking#pentesting#bugbounty#recon#pentest#infosec#cybersecurity#itsecurity#websecurity#appsec#hacker#security#Hackers#Android#Androidhacking#bugbountytips#bugbountytip#hackerone -
#bugbountytips#bugbounty Login Page Authentication bypass: Any file name / authorize account/connect/authorize home/authorize dashboard/authorize account/authorize/pic.twitter.com/Otm5sb8DS3
-
CSP bypass for googleapis[.]com/customsearch/
#bugbountytips pic.twitter.com/dOi3IWfxxg
-
#bugbountytips#bugbounty#infosec Awesome Payloads Server-Side Template Injection Linux - Privilege Escalationhttps://github.com/Dhamuharker/Server-Side-Template-Injection … -
Simple 2FA bypass tip: Account setting > Change email > Logout > Login with password via email confirm link > 2FA won't ask when the backend check for login email.(only for rare cases)
#bugbountytips -
A couple of people asked for my 'XSS for 2020' cheatsheet in PDF format, so I went ahead and made it today. Enjoy. :) https://netsec.expert/public/serve/xss_2020.pdf …
#bugbountytips -
Got a survey from? Don't only test for blind xss Try this once
#bugbountytips pic.twitter.com/w2jr5FMLec
-
Hey bug hunters! Want a look at some of the top vulnerabilities ever found on
@Dropbox ? They just released the last blog post I wrote before leaving. Enjoy!#bugbountytips https://blogs.dropbox.com/tech/2020/02/dropbox-bug-bounty-program-has-paid-out-over-1000000/ …Prikaži ovu nit -
I use my mobile phone with a termux app to find these two bugs while doing some uni stuff. Nmap syntax used to find ssl poodle: nmap -sV --version-light -Pn --script ssl-poodle -p 443 http://do.main.com
#bugbountytips pic.twitter.com/nMEf004Foh
-
Don’t forget to check ‘9200’ port for Elasticsearch.
#bugbountytips pic.twitter.com/q6Z0BYADDZ
-
You can do anonymously LDAP search on your targets using this command: ldapsearch -h <TARGET IP> 389 -x -s base -b '' "(objectClass=*)" "*"
#bugbountytips pic.twitter.com/p8UAyP4a0O
Prikaži ovu nit -
-API TIP:26/31- Looking for BOLA (IDOR) in APIs? got 401/403 errors? AuthZ bypass tricks: * Wrap ID with an array {“id”:111} --> {“id”:[111]} * JSON wrap {“id”:111} --> {“id”:{“id”:111}} * Send ID twice URL?id=<LEGIT>&id=<VICTIM> * Send wildcard {"user_id":"*"}
#bugbountytipsPrikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.