-
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :) https://netsec.expert/2020/02/01/xss-in-2020.html …
#bugbountytips pic.twitter.com/Mdygq1PI9Z
-
This is a summary for what i discussed with
@NahamSec in our latest#twitch stream about my recon process, that will be easier for you as you might mess some when you watch the video later on. https://pastebin.com/dyNMPAAJ Thanks Ben, what you do for community is dope#bugbountytips -
Steps 0) Login in with Twitter 1) Host Header Injection [to a.cxx] 2) Generate OAuth Token's Link 3) Send link to Victim, after victim authorize 4) Verifier send to a.cxx 5) Reuse use token Account Takeover by
@ngalongc#bugbountytips#bugbountytiphttps://hackerone.com/reports/317476 -
-API TIP:26/31- Looking for BOLA (IDOR) in APIs? got 401/403 errors? AuthZ bypass tricks: * Wrap ID with an array {“id”:111} --> {“id”:[111]} * JSON wrap {“id”:111} --> {“id”:{“id”:111}} * Send ID twice URL?id=<LEGIT>&id=<VICTIM> * Send wildcard {"user_id":"*"}
#bugbountytipsPrikaži ovu nit -
-API TIP: 31/31- Found a "limit" / "page" param? (e.g: /api/news?limit=100) It might be vulnerable to Layer 7 DoS. Try to send a long value (e.g: limit=999999999) and see what happens :)
#bugbountytips -
#bugbountytips#bugbounty#infosec Awesome Payloads Server-Side Template Injection Linux - Privilege Escalationhttps://github.com/Dhamuharker/Server-Side-Template-Injection … -
I just got a fancy idea to create strings in
#javascript without using dangerous characters
Inspired by @garethheyes challenge from@WebSecAcademy.#bugbountytips#xsspic.twitter.com/GiAe0REwLI
Prikaži ovu nit -
#OSINT: theHarvester:https://github.com/laramies/theHarvester … Recon-ng:https://bitbucket.org/LaNMaSteR53/recon-ng … FOCA:https://github.com/ElevenPaths/FOCA … Discover:https://github.com/leebaird/discover … Spiderfoot:http://www.spiderfoot.net/ Sn1per:https://github.com/1N3/Sn1per SimplyEmail:https://github.com/SimplySecurity/SimplyEmail …#bugbountytips#redteam#BugBounty -
Look what I found on
@LinkedIn
Have fun my friends, BUG OUT.
#CyberSecurity#Security#BugBountyTip#bugbountytips#Hackers#SecurityResearcher#TheCyberSecurityHubpic.twitter.com/8oCpnkRIly
-
SOP bypass SOP Bypass via browser-cache https://enumerated.wordpress.com/2019/12/24/sop-bypass-via-browser-cache … Exploiting a Microsoft Edge Vulnerability to Steal Files https://www.netsparker.com/blog/web-security/stealing-local-files-with-simple-html-file … Google sites and exploiting same origin policy https://link.medium.com/RejU1vJyI3 https://thehackerblog.com/reading-your-emails-with-a-readwrite-chrome-extension-same-origin-policy-bypass-8-million-users-affected/index.html …
#bugbounty,#bugbountytips -
Neat xss payload required to bypass filters: 1. No periods allowed 2. Regex filter on text followed by '(' Blocking "alert(, confirm(, etc", but the self['alert']( got by the filter Payload: ?t=test'*self['alert'](document['domain'])*'test
#bugbountytips#xss -
A source code analyzer built for surfacing features https://github.com/microsoft/ApplicationInspector … Burp Bounty(a quick and simple way, to improve the active and passive scanner) https://github.com/wagiro/BurpBounty … Sublert is a security and reconnaissance tool https://github.com/yassineaboukir/sublert …
#bugbounty,#bugbountytips -
There are some endpoints show JSON, but forget to set the header to “Content-type: application/json” and leave it as “Content-type: text/html” , and they show special chars , easy XSS ;)
#bugbountytip#bugbountytips#BugBounty -
Success in
#bugbounty is 50% metagame. Learn what bugs programs pay more for. Learn when to file similar bugs as one High and when to file them as separate Lows/Meds. Learn how to build a relationship with the program. Learn when to take a break and go outside.#bugbountytips -
hey anyone here targeted AT&T, if AT&T make my report triaged that's mean my report accepted 100% or not ?
#BugBounty#bugbountytips#bugbountytip -
#bugbountytips on exploiting XXE vulnerability from different angles.@stokfredrik I know you LOVE XXE, let me know if this video paves the way for new#BugBounty hunters to understand your interesting $7k bug!https://youtu.be/M0QPwIp4Gsw -
"How do I get started and what are some good resources?" check out these github repo for Beginner Bug Bounty Hunters - https://go.veres.tech/8agvvm
#hacking#bugbountytips -
#bugbountytip#bugbountytips Never underestimate the power of Google Dorking. Just found a defaced website for bugbounty program. pic.twitter.com/M3kEwoNDtI
-
Focus on Your Target, think creative, use your imagination, don't spend your time on attacks like reflected XSS etc. Try To Find Something Special ;)
#bugbountytips#infosec#cybersecurity -
To all those who haven't bought burp pro yet. Try proxy chaining. You can get all traffic through both burp and zap. I found it very useful. Happy hacking.
#bugbountytipsPrikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.