Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile
Abhishek Meena - {🔥}

@aacle_

Chief Operating Officer @Vulncure | Bug Hunter | 🖊️ Tester
🤝 Committed to infosec education.
📬 Open for DMs

ID: 877476093661294592

linkhttps://vulncure.com calendar_today21-06-2017 10:39:38

3,3K Tweet

38,38K Followers

250 Following

Mohamed Reda Desoky (@mrdesoky0) 's Twitter Profile Photo

Just released the Ultimate IDOR Testing Checklist 🧩 I combined techniques from many sources to cover IDOR scenarios. Know a technique I missed? Drop it in the comments. Notion: mrdesoky0.notion.site/Ultimate-IDOR-… GitHub: github.com/mrdesoky0/vuln… #bugbountytips #IDOR #AppSec #InfoSec

Just released the Ultimate IDOR Testing Checklist 🧩

I combined techniques from many sources to cover IDOR scenarios.

Know a technique I missed? Drop it in the comments.

Notion:
mrdesoky0.notion.site/Ultimate-IDOR-…
 
GitHub:
github.com/mrdesoky0/vuln…

#bugbountytips #IDOR #AppSec #InfoSec
Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

Cache poisoning isn’t dead — it’s evolving. I analyzed 20+ real bug bounty reports revealing how small misconfigurations turned into $100K+ in bounties. Learn the techniques, payloads & lessons from real hunters 👇 🔗 medium.com/@Aacle/20-cach… #BugBounty #WebSecurity

Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

Years ago, web cache poisoning was a theory few cared about. Now it’s one of the most lucrative attack surfaces in bug bounty programs. I studied 20+ real reports — breaking down: • ⚔️ Techniques • ⚙️ Root causes • 💡 Key takeaways Read the full breakdown 👇

Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

⚡️“Will AI Replace Pentesters?” Ben Sadeghipour put PortSwigger’s new BurpAI to the test — and the results are both fascinating and terrifying. Here’s what it really means for the future of hacking. 🧵👇 medium.com/@Aacle/is-burp…

Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

New bug bounty resource 🚀 The Cache Poisoning Bible - Part 1: Advanced Fundamentals Everything I wish I knew when I started: • Cache key architectures • CDN comparison guide • Advanced detection methods • Real-world patterns medium.com/@Aacle/the-cac…

Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

Stop missing cache poisoning vulnerabilities. Most hunters only test X-Forwarded-Host and miss 90% of the attack surface. I wrote a complete guide to finding what others miss: medium.com/@Aacle/the-cac… #bugbounty #infosec

Stop missing cache poisoning vulnerabilities.

Most hunters only test X-Forwarded-Host and miss 90% of the attack surface.

I wrote a complete guide to finding what others miss:

medium.com/@Aacle/the-cac…

#bugbounty #infosec
Renganathan (@iamrenganathan) 's Twitter Profile Photo

Found a login page with CAPTCHA that looked secure, but its Angular build exposed a hardcoded 3rd-party CRM API key and domain. Using the API docs and curl, I accessed over thousands of support tickets and internal conversations. Devs should be careful with what goes to prod :)

Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

Cache timing signatures you should memorize: • HIT: 10-50ms • MISS: 200-500ms • Backend: 500ms+ Even without reflection, timing reveals everything.

Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

CACHE POISONING QUICK WIN: Most apps validate X-Forwarded-Host as a single value. But try this: X-Forwarded-Host: legit.com, evil.com • CDN: Reads first → Allows ✅ • App: Reads last → Injects ⚠️