bugoverflow (@bugoverfl0w) 's Twitter Profile
bugoverflow

@bugoverfl0w

hackerone.com/bugoverflow 🔥

ID: 1222798106611220481

calendar_today30-01-2020 08:26:11

5,5K Tweet

2,2K Followers

738 Following

Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

I’ve noticed that most new folks who reach out for guidance in bug bounty feel overwhelmed early on trying to learn everything at once. That often leads to half-baked knowledge across multiple areas and slower overall progress. Here's what I recommend instead 👇 1/ Pick one

Tib3rius (@0xtib3rius) 's Twitter Profile Photo

I often get asked what tools I use for web app pentesting, and people are surprised when I say it's 99% Burp Suite Pro. Here's why... 🧵👇

I often get asked what tools I use for web app pentesting, and people are surprised when I say it's 99% Burp Suite Pro. Here's why...

🧵👇
Jason Haddix (@jhaddix) 's Twitter Profile Photo

== a websec thread == Inspired by Tib3rius I wanted to post my taxonomy of the different types of web scanning as i think it's important for people getting into web security to know. I'll frame some of these in their context as it pertains to PortSwigger 's Burp Suite and

== a websec thread ==

Inspired by <a href="/0xTib3rius/">Tib3rius</a> I wanted to post my taxonomy of the different types of web scanning as i think it's important for people getting into web security to know. 

I'll frame some of these in their context as it pertains to <a href="/PortSwigger/">PortSwigger</a> 's  Burp Suite and
Priyanshu Shakya 🇮🇳 (@pranshux0x) 's Twitter Profile Photo

In April, Mukul Goyal and I earned $50k — and guess what? We spent the first 4 days just setting up the application and reading its documentation. Never underestimate recon and prep. Understanding the app deeply often leads to bugs others miss.

In April, <a href="/itz_mg_/">Mukul Goyal</a>  and I earned $50k — and guess what? We spent the first 4 days just setting up the application and reading its documentation. Never underestimate recon and prep. Understanding the app deeply often leads to bugs others miss.
drak3hft7 (@drak3hft7) 's Twitter Profile Photo

🧐Never underestimate a JavaScript file. Many focus on visible functionality, but publicly exposed JavaScript files can reveal far more: internal API endpoints, flawed client-side logic, and sometimes even hardcoded credentials, token etc. . #BugBounty #bugbountytips

🧐Never underestimate a JavaScript file.

Many  focus on visible functionality, but publicly exposed JavaScript files  can reveal far more: internal API endpoints, flawed client-side logic,  and sometimes even hardcoded credentials, token etc. .
#BugBounty #bugbountytips
Hemant Patidar (@hemantsolo) 's Twitter Profile Photo

💸 Earned €3,000 (~₹2.9 Lakh) for finding sensitive data exposed in a .js file. Used Burp Suite + Extensions Param Miner + JS Miner (thank you PortSwigger 🙌) 🌐 Reported via Yogosha (grateful for the platform!) #bugbounty #infosec #cybersecurity #appsec #security

💸 Earned €3,000 (~₹2.9 Lakh) for finding sensitive data exposed in a .js file.

Used Burp Suite + Extensions Param Miner + JS Miner (thank you <a href="/PortSwigger/">PortSwigger</a> 🙌)

🌐 Reported via <a href="/YogoshaOfficial/">Yogosha</a> (grateful for the platform!)

#bugbounty #infosec #cybersecurity #appsec #security
Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Video of my talking in #PHDays at PT Security youtu.be/CJnXjWXXB1Y?si… Hope you like it and enjoy it #bugbounty #bugbountytip #bugbountytips #infosec

Somdev Sangwan (@s0md3v) 's Twitter Profile Photo

This website has 50 vulnerabilities and it doesn't tell you which ones. hack-yourself-first.com If you are a beginner and have already gone through popular labs and resources, this is perfect for practice.

encodedguy - jsmon.sh (@3nc0d3dguy) 's Twitter Profile Photo

Hacking JS Files using AI. Here's a video by Jsmon - jsmon.sh on how to understand a GraphQL operation present in a JS file and ask AI for possible attack vectors. youtu.be/5BLZR7i0ZAk?si…

Mohamed Yusuf (@edx103) 's Twitter Profile Photo

After 4 months, 28 rejected reports, countless sleepless nights, and moments I almost gave up… Today, I finally got my first valid bug. One triaged report. One step closer to my dream. Bug bounty is hard, but giving up is harder. This is just the beginning. 🚀 #BugBounty

After 4 months, 28 rejected reports, countless sleepless nights, and moments I almost gave up…
Today, I finally got my first valid bug. One triaged report. One step closer to my dream.

Bug bounty is hard, but giving up is harder.
This is just the beginning. 🚀
#BugBounty
MasterSplinter (@m4st3rspl1nt3r) 's Twitter Profile Photo

My Salesforce 0-day got patched! I noticed today that an SOQL injection in Salesforce itself that I reported a few months ago is not working anymore. Since they did not release any CVE or advisory I decided to post a small writeup, enjoy! mastersplinter.work/research/sales…

Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Slides of the talk in #PHDays PT Security docs.google.com/presentation/d… hoping be very helpful for all of you ♥ #bugbounty #bugbountytips #bugbountytip If you didn't check the video of the talk , then its time ===>

0x2458 🇮🇳 (@0x2458) 's Twitter Profile Photo

bugoverflow Fares I Followed these resources: - doug-merrett.medium.com/salesforce-com… This one's the best: varonis.com/blog/abusing-s… - intigriti.com/researchers/bl… - hackerone.com/reports/1023572

hackermater (@hackermater11) 's Twitter Profile Photo

It's hard to believe, but after a long time I got my FIRST BOUNTY... and yeah: it was a P1 Critical $3.000 !!!! #bugbountytips don't try to automate everything, use Burp Suite and dedicate at least 1-2 weeks to understand the whole application and do manual hacking ;) #bugbounty

It's hard to believe, but after a long time I got my FIRST BOUNTY... and yeah: it was a P1 Critical $3.000 !!!!

#bugbountytips don't try to automate everything, use Burp Suite and dedicate at least 1-2 weeks to understand the whole application and do manual hacking ;) #bugbounty
Standoff Bug Bounty (@standoffbb) 's Twitter Profile Photo

Missed our Standoff Bug Bounty AMA with legends @hussein98d & nikhil(niks)? They shared tips on getting started, favorite tools, personal tactics & the future of cybersecurity. Catch the recap – secrets included: youtu.be/gS7ss_bwm9g?si…

André Baptista (@0xacb) 's Twitter Profile Photo

Nginx normalizes paths (/../, %2e, etc.) before applying access rules like: location = /admin { deny all; } But backends like Node.js or PHP handle decoding again, and differently. Requesting /;admin or /admin%2f..%2f might bypass Nginx’s block, but get normalized to /admin by

Nginx normalizes paths (/../, %2e, etc.) before applying access rules like: location = /admin { deny all; }

But backends like Node.js or PHP handle decoding again, and differently.

Requesting /;admin or /admin%2f..%2f might bypass Nginx’s block, but get normalized to /admin by