Mostafa Alrefai (@__the7th) 's Twitter Profile
Mostafa Alrefai

@__the7th

TTMG - Cyber Warrior - Sharing Gems

ID: 1558548735025713153

linkhttps://the7th.medium.com calendar_today13-08-2022 20:19:34

40 Tweet

32 Followers

1 Following

Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

One technique to detect "Blind Command Injection" is time-based detection ... like SQLi Following are three Linux-based commands to get a 10-second timeout from the target server...

One technique to detect "Blind Command Injection" is time-based detection ... like SQLi

Following are three Linux-based commands to get a 10-second timeout from the target server...
Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

[*] RCE exploit tip... If you have a "Blind RCE" and you can get HTTP interactions using `curl` command... You can steal local files from the server by using the `-d` flag with the `@` symbol at the beginning of the target file name and send the full content to your OOB server

[*] RCE exploit tip...

If you have a "Blind RCE" and you can get HTTP interactions using `curl` command...

You can steal local files from the server by using the `-d` flag with the `@` symbol at the beginning of the target file name and send the full content to your OOB server
Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

[*] Bug Hunting Wisdom... Don't underestimate a bug ... Why? Because it's not about the bug, it's all about the impact... This case was plain text usernames and passwords due to a simple misconfiguration

[*] Bug Hunting Wisdom...

Don't underestimate a bug ... Why?

Because it's not about the bug, it's all about the impact...

This case was plain text usernames and passwords due to a simple misconfiguration
Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

[*] Bug Bounty Skills... (More Parameters = More Vulnerabilities) Did you know that there are 4 types of discovery techniques: 1. Website Crawling (Active) 2. Hidden Parameter Fuzzing (Active) 3. JavaScript Mining (Passive) 4. Searching Public Archives (Passive) 🧵Thread...

Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

🧵Bug Bounty Diaries ( D2 ) Today, I found my first "Prototype Pollution" vulnerability in the wild, but it can't be a valid bug to be reported on its own, so when you find a PP, you should dig deeper to combine it with a gadget in order to build a valid report...

🧵Bug Bounty Diaries ( D2 )

Today, I found my first "Prototype Pollution" vulnerability in the wild, but it can't be a valid bug to be reported on its own, so when you find a PP, you should dig deeper to combine it with a gadget in order to build a valid report...
Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

🧵Bug Bounty Diaries ( D3 ) This was an EPIC hack... TTMG, In this report, I was able to combine 2 vulnerabilities to bypass the login page of an admin portal and log in as an admin, without any username or password Maybe more details in the future...

🧵Bug Bounty Diaries ( D3 )

This was an EPIC hack...

TTMG, In this report, I was able to combine 2 vulnerabilities to bypass the login page of an admin portal and log in as an admin, without any username or password

Maybe more details in the future...
Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

🧵Bug Bounty Diaries ( D4 ) How to escalate an "Open Redirect" from P5 to P3 or P1 Yesterday, I found an Open Redirect in a public VDP, and I wanted to teach you the exploitation process that you should take before reporting the bug as a P5 ... thread...

🧵Bug Bounty Diaries ( D4 )

How to escalate an "Open Redirect" from P5 to P3 or P1

Yesterday, I found an Open Redirect in a public VDP, and I wanted to teach you the exploitation process that you should take before reporting the bug as a P5 ... thread...
Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

I wanted to add some information about Exploit 1. After testing the exploit on live targets and a local lab, I validated that the XSS payload will work only if it is a DOM-Based Open Redirect, and if it were a Server-Based Open Redirect, the browser will stop the XSS from running

I wanted to add some information about Exploit 1. After testing the exploit on live targets and a local lab, I validated that the XSS payload will work only if it is a DOM-Based Open Redirect, and if it were a Server-Based Open Redirect, the browser will stop the XSS from running
Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

🧵Bug Bounty Diaries ( D6 ) It's still a VDP, but the chain was EPIC => From CSTI (Client-Side Template Injection) to XSS Gadget + WAF Bypass => From XSS to CSP Bypass => From CSP Bypass to fetch requests => From fetch requests to Cookie hijacking

🧵Bug Bounty Diaries ( D6 )

It's still a VDP, but the chain was EPIC

=> From CSTI (Client-Side Template Injection) to XSS Gadget + WAF Bypass

=> From XSS to CSP Bypass

=> From CSP Bypass to fetch requests

=> From fetch requests to Cookie hijacking