DataFuel (@datafuel0) 's Twitter Profile
DataFuel

@datafuel0

ID: 1627602636932358145

calendar_today20-02-2023 09:35:11

374 Tweet

9 Followers

25 Following

DataFuel (@datafuel0) 's Twitter Profile Photo

I feel like I am going to Pause #bugbounty for at list some moths and come back. I will also quite social media in that period. I know it is not only me getting duplicate, but on my side; getting multiple duplicates with CVSS of 9.0+ is wild. I think will be back stronger. END

I feel like I am going to Pause #bugbounty for at list some moths and come back. I will also quite social media in that period. I know it is not only me getting duplicate, but on my side; getting multiple duplicates with CVSS of 9.0+ is wild. 

I think will be back stronger.

END
DataFuel (@datafuel0) 's Twitter Profile Photo

reading JS: I found Internal API base URL , services URLs, Feature flags, Company IDs. It is REACT_APP_ * env. Intentionally baked into frontend. But guess what? It exposes secret internal HashiCorp vault (f**t**k*x) subdomain. It is used to store. Db-keys, encry-keys, s-t-s😎

reading JS: I found Internal API base URL , services URLs, Feature flags, Company IDs. It is REACT_APP_ * env. Intentionally baked into  frontend. But guess what? It exposes secret internal HashiCorp  vault (f**t**k*x) subdomain. It is used to store. Db-keys, encry-keys, s-t-s😎
DataFuel (@datafuel0) 's Twitter Profile Photo

Man I don't have ability to pay for Claude code. There are many dupes nowadays bc of ai. I don't use ai at all and but if you are using it a get bugs congratulation. Things have changes so much. Now it is AI+YourReasoning + speed= bugs. 😂😂 Enjoy while you can afford ai.

Man I don't have ability to pay for Claude code. There are many dupes nowadays bc of ai. I don't use ai at all and but if you are using it a get bugs congratulation. 

Things have changes so much. Now it is AI+YourReasoning + speed= bugs. 😂😂

Enjoy while you can afford ai.
DataFuel (@datafuel0) 's Twitter Profile Photo

This is how I choose programs I attend on hackerone using claude sonnet 4.6. Do not ever jump into a program, just first analyze it deeply.

DataFuel (@datafuel0) 's Twitter Profile Photo

Yoo, wtf. Anyone using this tool? I tried this l GhostJS to help me scan large number of js files but the results are wild. Tbh, impact is real. Find the tool here: app.trinetlayer.com

Yoo, wtf. Anyone using this tool? 
I tried this  l GhostJS  to help me scan large number of  js files but the results are wild. Tbh, impact is real.

Find the tool here: app.trinetlayer.com
DataFuel (@datafuel0) 's Twitter Profile Photo

I’m not an expert, my te.. community asked how I choose HackerOne programs. I use Claude Sonnet + simple PowerShell checks before hunting. I made a prompt to help pick better targets on any bug bounty platform. Prompt link from my calude storage: erdserqzroebtfztwmgh.supabase.co/storage/v1/obj…

DataFuel (@datafuel0) 's Twitter Profile Photo

hakoriginfinder finds the real origin server behind proxies by comparing responses from IPs to the target site. It uses Host headers and Levenshtein similarity to detect matching backend servers. github.com/hakluke/hakori…

DataFuel (@datafuel0) 's Twitter Profile Photo

Duplicate again today with a cvss score of 10.0 Now i am telling myself: Don't give up. It close. I submitted it by today 1pm and got Duplicate at 3pm. I couldent believe how it was a duplicate since I was able to do privilege escalation with admin credentials.

Duplicate again today with a cvss score of 10.0

Now i am telling myself: Don't give up. It close.

I submitted it by today 1pm and got Duplicate at 3pm.

I couldent believe how it was a duplicate since I was able to do privilege escalation with admin credentials.
DataFuel (@datafuel0) 's Twitter Profile Photo

Now🔥 Exposed TURN credentials. The Next.js runtime environment variables were compiled directly into the client-side bundle. More, SSL verification disabled as well.

Now🔥

Exposed TURN credentials. The Next.js runtime environment variables were compiled directly into the client-side bundle. 

More, SSL verification disabled as well.
DinDinDin (@comores_11) 's Twitter Profile Photo

🔥 XSS Tip: Unicode Normalization Don't give up if <, >, " or ' are filtered ! Many apps normalize Unicode after the WAF/security layer. Some bypass variants (URL-encoded): 🔹 < ➔ %EF%BC%9C 🔹 > ➔ %EF%BC%9E 🔹 " ➔ %EF%BC%A2 🔹 ' ➔ %EF%BC%87 🔹 ` ➔ %EF%BD%80 For example,

the_IDORminator (@the_idorminator) 's Twitter Profile Photo

I maintain that adding a trailing slash to random pages and APIs remains the stupidest albeit perhaps most effective and prevalent authorization and/or WAF bypass there is. Go slay #bugbounty, the world depends on your proper insertion of the slash. When you get your first

DataFuel (@datafuel0) 's Twitter Profile Photo

I submitted a report INTENTIONALY out of the Scope. The CVSS score is 9.8+ and the triage instead of rejecting it or closing it, they changed my report title and report details to something even massive which is also still out of scope😎😎 lets see how it goes.

I submitted a report INTENTIONALY out of the Scope. The CVSS score is 9.8+ and the triage instead of rejecting it or closing it,  they changed my report title and report details to something even massive which is also still out of scope😎😎

lets see how it goes.
DataFuel (@datafuel0) 's Twitter Profile Photo

I have been following your journey. and honestly I can relate to this. This how people become successfull. Once the universe open the door for you, you will be overwhelmed by the positive return of your invested effort. Keep it up.

DataFuel (@datafuel0) 's Twitter Profile Photo

Scan js files. Or do manual checking. The URL I got while reading a js file was just bootstrap URL by design. However, when i tried it it returned thousands or employees information. #bugbounty #informationDisclosure

Scan js files. Or do manual checking. 

The URL I got while reading  a js file  was just bootstrap URL by design. 

However, when i tried it it returned thousands or employees information.

#bugbounty  #informationDisclosure
DataFuel (@datafuel0) 's Twitter Profile Photo

Found endpoint, returned PII containing (full names, emails, phone numbers, system configurations, thier phone type, and location). Submitted it, and they said "it is not that sensitive, show exploitation with those data" Fine. I asked myself what do i do? Unable to escalate.

Found endpoint, returned PII containing (full names, emails, phone numbers, system configurations, thier phone type, and location).

Submitted it, and they said "it is not that sensitive, show exploitation with those data"

Fine. I asked myself what do i do? 

Unable to escalate.
DataFuel (@datafuel0) 's Twitter Profile Photo

Information Disclosure Public Archives (Wayback) on app.reducted.com through /l/share/{conversation-uuid}/{bearer-token} via Path Wayback payload to check archived URL: Replace the place holder with your target in the payload. web.archive.org/cdx/search?url…

Information Disclosure Public Archives (Wayback) on app.reducted.com through /l/share/{conversation-uuid}/{bearer-token} via Path

Wayback payload to check archived URL:

Replace the place holder with your target in the payload.

web.archive.org/cdx/search?url…
Coffin (@coffinxp7) 's Twitter Profile Photo

Most people don’t realize how little real competition there is in bug hunting. A huge part of the younger generation is focused on gaming, while others spend most of their time scrolling Instagram, TikTok and similar platforms. Even within tech, a lot of people are tied up in