SoloSecurities (@solosecurities) 's Twitter Profile
SoloSecurities

@solosecurities

The worlds data needs defending. Solo Securities provides you a complete cyber security services.

ID: 1290891206570852354

linkhttps://solosecurities.com/ calendar_today05-08-2020 06:03:48

35 Tweet

22 Followers

22 Following

SoloSecurities (@solosecurities) 's Twitter Profile Photo

πŸš€ Bypass Restrictions Like a Pro! πŸ”₯ Struggling with Access Denied (403)? Try these header tricks to potentially unlock admin access! πŸ’° πŸ”Ή X-Original-URL: /admin πŸ”Ή X-Rewrite-URL: /admin πŸ”Ή X-Custom-URL: /admin If the response flips 403 ➑️ 200, you’re in! #BugBounty

πŸš€ Bypass Restrictions Like a Pro! πŸ”₯

Struggling with Access Denied (403)? Try these header tricks to potentially unlock admin access! πŸ’°

πŸ”Ή X-Original-URL: /admin
 πŸ”Ή X-Rewrite-URL: /admin
 πŸ”Ή X-Custom-URL: /admin
If the response flips 403 ➑️ 200, you’re in! 

#BugBounty
SoloSecurities (@solosecurities) 's Twitter Profile Photo

πŸš€ Bug Bounty Tip: Bypass WAF by Finding the Origin IP! πŸ”Ž Steps: 1️⃣ Find ASN via bgp.he.net 2️⃣ Identify the IP range 3️⃣ Scan with: prips 93.184.216.0/24 | hakoriginfinder -d example.com 4️⃣ Check for MATCHβ€”you’ve found the Origin IP!🎯 #CyberSecurity

πŸš€ Bug Bounty Tip: Bypass WAF by Finding the Origin IP!

πŸ”Ž Steps:
1️⃣ Find ASN via bgp.he.net
2️⃣ Identify the IP range
3️⃣ Scan with:
prips 93.184.216.0/24 | hakoriginfinder -d example.com
4️⃣ Check for MATCHβ€”you’ve found the Origin IP!🎯

#CyberSecurity
SoloSecurities (@solosecurities) 's Twitter Profile Photo

πŸ” Bug Bounty Tip – Find Hidden Subdomains! 🎯Use Certificate Transparency Logs to uncover forgotten subdomains & expand your attack surface! πŸš€ #BugBounty #CyberSecurity #OSINT #Pentesting #EthicalHacking #Infosec #RedTeam

πŸ” Bug Bounty Tip – Find Hidden Subdomains! 🎯Use Certificate Transparency Logs to uncover forgotten subdomains & expand your attack surface! πŸš€

#BugBounty #CyberSecurity #OSINT #Pentesting #EthicalHacking #Infosec #RedTeam
SoloSecurities (@solosecurities) 's Twitter Profile Photo

πŸ“’ Bug Bounty Tip: CSRF Bypass via Forgotten API Endpoints Even if your main API enforces x-csrf-token, legacy endpoints might still be wide open πŸ‘€ βœ… /api/user/account/DELETE β†’ Protected ❌ /xos_api/user/account/DELETE β†’ No CSRF check! #BugBounty #WebSecurity #CSRF

πŸ“’ Bug Bounty Tip: CSRF Bypass via Forgotten API Endpoints

Even if your main API enforces x-csrf-token, legacy endpoints might still be wide open πŸ‘€

βœ… /api/user/account/DELETE β†’ Protected
❌ /xos_api/user/account/DELETE β†’ No CSRF check!

#BugBounty #WebSecurity #CSRF
SoloSecurities (@solosecurities) 's Twitter Profile Photo

πŸ§ πŸ’» Bug Bounty Trick: Base64 Image in a Text Field You're testing how the app handles unexpected data types β€” a goldmine for bugs like XSS, content sniffing, or poor input validation. πŸžπŸ” Real hackers don’t just think outside the box β€” they *test* the box. πŸ”“ #BugBounty

πŸ§ πŸ’» Bug Bounty Trick: Base64 Image in a Text Field

You're testing how the app handles unexpected data types β€” a goldmine for bugs like XSS, content sniffing, or poor input validation. πŸžπŸ”

Real hackers don’t just think outside the box β€” they *test* the box. πŸ”“

#BugBounty
SoloSecurities (@solosecurities) 's Twitter Profile Photo

πŸ“„πŸ’£ PDF Script Injection: Silent but Deadly 3 attack vectors every bug hunter should know: 1️⃣ Metadata: "><script>alert(1)</script> 2️⃣ /OpenAction JS 3️⃣ File name: "><script>alert(1)</script>.pdf πŸ’‘ Chain for max impact. πŸ›‘οΈ Test. Report. Get paid. #BugBounty #CyberSecurity

πŸ“„πŸ’£ PDF Script Injection: Silent but Deadly

3 attack vectors every bug hunter should know:

1️⃣ Metadata: "&gt;&lt;script&gt;alert(1)&lt;/script&gt;
2️⃣ /OpenAction JS
3️⃣ File name: "&gt;&lt;script&gt;alert(1)&lt;/script&gt;.pdf
πŸ’‘ Chain for max impact.
πŸ›‘οΈ Test. Report. Get paid.

#BugBounty #CyberSecurity
Hemant Patidar (@hemantsolo) 's Twitter Profile Photo

While I hunted the big 🍎, automation secured the bag πŸ’Όβ€”P3 & P4 holding it down! €200 earned via systematic recon: πŸ” Subdomain β†’ Port scan β†’ Dir brute β†’ Old creds & logs Details on the Apple vuln dropping soon (sensitive bits redacted) πŸ•΅οΈβ€β™‚οΈ #BugBounty #Infosec #Security

While I hunted the big 🍎, automation secured the bag πŸ’Όβ€”P3 &amp; P4 holding it down!

€200 earned via systematic recon: πŸ” Subdomain β†’ Port scan β†’ Dir brute β†’ Old creds &amp; logs

Details on the Apple vuln dropping soon (sensitive bits redacted) πŸ•΅οΈβ€β™‚οΈ

#BugBounty #Infosec #Security
SoloSecurities (@solosecurities) 's Twitter Profile Photo

⏳ Only 2 Days Left! πŸ”₯ May Batch – Live Bug Bounty Training From Beginner to Advanced πŸžπŸ’° 🧠 Learn real-world hacking πŸ† Land bounties & HoF mentions πŸ“… Starts: 12 May 2025 🎟️ Register: wa.me/message/VYWZKX… Or visit: academy.solosecurities.com #BugBounty #EthicalHacking

⏳ Only 2 Days Left!
πŸ”₯ May Batch – Live Bug Bounty Training
From Beginner to Advanced πŸžπŸ’°

🧠 Learn real-world hacking
πŸ† Land bounties &amp; HoF mentions
πŸ“… Starts: 12 May 2025
🎟️ Register: wa.me/message/VYWZKX…
Or visit: academy.solosecurities.com
#BugBounty #EthicalHacking