Rezultati pretraživanja
  1. 1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

  2. 28. sij

    This is a summary for what i discussed with in our latest stream about my recon process, that will be easier for you as you might mess some when you watch the video later on. Thanks Ben, what you do for community is dope

  3. 31. sij

    Steps 0) Login in with Twitter 1) Host Header Injection [to a.cxx] 2) Generate OAuth Token's Link 3) Send link to Victim, after victim authorize 4) Verifier send to a.cxx 5) Reuse use token Account Takeover by

  4. 27. sij

    -API TIP:26/31- Looking for BOLA (IDOR) in APIs? got 401/403 errors? AuthZ bypass tricks: * Wrap ID with an array {“id”:111} --> {“id”:[111]} * JSON wrap {“id”:111} --> {“id”:{“id”:111}} * Send ID twice URL?id=<LEGIT>&id=<VICTIM> * Send wildcard {"user_id":"*"}

    Prikaži ovu nit
  5. 1. velj

    -API TIP: 31/31- Found a "limit" / "page" param? (e.g: /api/news?limit=100) It might be vulnerable to Layer 7 DoS. Try to send a long value (e.g: limit=999999999) and see what happens :)

  6. 30. sij

    Awesome Payloads Server-Side Template Injection Linux - Privilege Escalation

  7. 1. velj

    I just got a fancy idea to create strings in without using dangerous characters 😃 Inspired by challenge from .

    Prikaži ovu nit
  8. 27. sij
  9. 31. sij
  10. 1. velj
  11. 31. sij

    Neat xss payload required to bypass filters: 1. No periods allowed 2. Regex filter on text followed by '(' Blocking "alert(, confirm(, etc", but the self['alert']( got by the filter Payload: ?t=test'*self['alert'](document['domain'])*'test

  12. A source code analyzer built for surfacing features Burp Bounty(a quick and simple way, to improve the active and passive scanner) Sublert is a security and reconnaissance tool ,

  13. 27. sij

    There are some endpoints show JSON, but forget to set the header to “Content-type: application/json” and leave it as “Content-type: text/html” , and they show special chars , easy XSS ;)

  14. 2. velj

    Success in is 50% metagame. Learn what bugs programs pay more for. Learn when to file similar bugs as one High and when to file them as separate Lows/Meds. Learn how to build a relationship with the program. Learn when to take a break and go outside.

  15. hey anyone here targeted AT&T, if AT&T make my report triaged that's mean my report accepted 100% or not ?

  16. prije 2 sata

    on exploiting XXE vulnerability from different angles. I know you LOVE XXE, let me know if this video paves the way for new hunters to understand your interesting $7k bug!

  17. prije 5 sati

    "How do I get started and what are some good resources?" check out these github repo for Beginner Bug Bounty Hunters -

  18. prije 5 sati

    Never underestimate the power of Google Dorking. Just found a defaced website for bugbounty program.

  19. 2. velj

    Focus on Your Target, think creative, use your imagination, don't spend your time on attacks like reflected XSS etc. Try To Find Something Special ;)

  20. 2. velj

    To all those who haven't bought burp pro yet. Try proxy chaining. You can get all traffic through both burp and zap. I found it very useful. Happy hacking.

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.