Bug Bounty Recon (@bugbountyrecon) 's Twitter Profile
Bug Bounty Recon

@bugbountyrecon

ID: 1282584823056470016

linkhttps://github.com/serain/bbrecon calendar_today13-07-2020 07:57:29

36 Tweet

1,1K Followers

1,1K Following

Bug Bounty Recon (@bugbountyrecon) 's Twitter Profile Photo

Very nice find Chirag Gupta ! Nice approach and straightforward automation. There's bound to be more of these out there folks, go hunt 🙃 #bugbountytips #BugBounty

Bug Bounty Recon (@bugbountyrecon) 's Twitter Profile Photo

Compromising AWS with an HTTP header! Don't forget to look for DNS rebinding in Referer headers in your #BugBounty #bugbountytips alex.kaskaso.li/post/dns-rebin…

Katie Paxton-Fear (@insiderphd) 's Twitter Profile Photo

DEFCON is free this year so definitely take advantage of it, Louis Nyffenegger is doing a workshop on JWT for AppSec Village ! and I can't wait to watch it, especially as JWTs are really common in service-based infrastructure + auth both on my 'to skill up' list

Hamid Kashfi (@hkashfi) 's Twitter Profile Photo

This paper on new timing attack technique based on HTTP2 multiplexing is beautiful! I’ve highlighted the key parts. Look at those request numbers! Now that Burp Suite supporte HTTP2 perhaps we can hope to have a hacker friendly HTTP2 stack available via API to benefitn this

This paper on new timing attack technique based on HTTP2 multiplexing is beautiful! I’ve highlighted the key parts. Look at those request numbers! 

Now that <a href="/Burp_Suite/">Burp Suite</a> supporte HTTP2 perhaps we can hope to have a hacker friendly HTTP2 stack available via API to benefitn this
GitHub Security Lab (@ghsecuritylab) 's Twitter Profile Photo

Next week Alvaro Muñoz will present full details about the many RCEs he discovered in CMS platforms such as Atlassian Confluence, Alfresco, Liferay, Crafter CMS, dotCMS, XWiki, and Apache Ofbiz github.co/3hP8Ahp

Bug Bounty Recon (@bugbountyrecon) 's Twitter Profile Photo

In case you missed it, there was an unauthenticated SSRF in Grafana released over the weekend. Go hit that cloud metadata endpoint! Also, patch yo stuff! rhynorater.github.io/CVE-2020-13379… #bugbounty #bugbountytips #Kubernetes

Intigriti (@intigriti) 's Twitter Profile Photo

Not a lot of hunters test for second order XS-Search attacks! Use an invalid value for non-primary parameters, depending on the execution order you'll be able to measure if the primary parameter value exists or not. Thanks for this PRO #BugBountyTip, terjanq! #BugBountyTips

Not a lot of hunters test for second order XS-Search attacks! 
Use an invalid value for non-primary parameters, depending on the execution order you'll be able to measure if the primary parameter value exists or not. Thanks for this PRO #BugBountyTip, <a href="/terjanq/">terjanq</a>! #BugBountyTips
Bug Bounty Recon (@bugbountyrecon) 's Twitter Profile Photo

bbrecon is in a limited beta, don't miss your chance to try it out! "Give me all the #BugBounty programs released in the last month that have web targets and reward cash" bugbountyrecon.com #bugbountytips #netsec

bbrecon is in a limited beta, don't miss your chance to try it out!

"Give me all the #BugBounty programs released in the last month that have web targets and reward cash"

bugbountyrecon.com

#bugbountytips #netsec
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Simple but impactful tip for content discovery. Always use the subdomain as a path. Often it is the root of the application #bugbountytips #bugbountytip : kvothe.target.com try: kvothe.target.com/kvothe/ and then do content discovery kvothe.target.com/kvothe/FUZZHERE

Bug Bounty Recon (@bugbountyrecon) 's Twitter Profile Photo

Instant subdomain recon is coming this weekend for the bbrecon API 🤗 In the mean time you can get all your #BugBounty program scopes directly from the CLI, in JSON, like a hacker should. #bugbountytips github.com/serain/bbrecon

Instant subdomain recon is coming this weekend for the bbrecon API 🤗

In the mean time you can get all your #BugBounty program scopes directly from the CLI, in JSON, like a hacker should.

#bugbountytips 

github.com/serain/bbrecon
Aman (@thevyadha) 's Twitter Profile Photo

Third #bugbountytips Lucky I found the password of Stripe live token.This is how 1. I found the token in Strings.xml file printed as sk_live_24 characters. 2. Used curl api.stripe.com/v1/charges -u token_here: But it was saying enter host for passwrd. Now comes my finding part

Bug Bounty Recon (@bugbountyrecon) 's Twitter Profile Photo

.Aiven just launched a public Bug Bounty program on HackerOne 🎉 Find fresh bug bounty programs with github.com/serain/bbrecon #BugBounty #infosec #CyberSecurity #ethicalhacking

.<a href="/aiven_io/">Aiven</a> just launched a public Bug Bounty program on <a href="/Hacker0x01/">HackerOne</a> 🎉

Find fresh bug bounty programs with github.com/serain/bbrecon

#BugBounty #infosec #CyberSecurity #ethicalhacking
Eduardo Nuri (@eduardo_nuri) 's Twitter Profile Photo

Thank you for the 3k followers!, sorry after those big bounties I took a little break!, Now coming back with more tips, very simple one but many new hunters didn't know. #bugbountytips #bugbounty

Thank you for the 3k followers!, sorry after those big bounties I took a little break!, Now coming back with more tips, very simple one but many new hunters didn't know. #bugbountytips #bugbounty
Ammar Amer (@cry__pto) 's Twitter Profile Photo

GitHub Recon - It’s Really Deep: medium.com/@shahjerry33/g… From SSRF to Compromise: Case Study: trustwave.com/en-us/resource… Bug Hunting with Param Miner: Cache poisoning with XSS, a peculiar case: medium.com/bugbountywrite… #PenTest #bugbountytip #OSINT #Hacking #redteam #BugBounty