Vikas Khanna (@0xn00b) 's Twitter Profile
Vikas Khanna

@0xn00b

#Learner #BugHunter #Pentester #InfosecAddict #WebSecurity

ID: 193242082

calendar_today21-09-2010 10:20:47

810 Tweet

190 Followers

1,1K Following

Yassine Aboukir 🐐 (@yassineaboukir) 's Twitter Profile Photo

I honestly didn't know about fingerprinting using the favicon hash until now. It's such a little neat recon technique paired with Shodan. I just leveraged for some more attack surface on the program I hack on now. This is a good reference: medium.com/@Asm0d3us/weap…

d3fp4r4m (@defparam) 's Twitter Profile Photo

hackerone.com/reports/771666 A new fully disclosed HTTP Request Smuggling ATO report from yours truly. Thanks Prateek Tiwari and @Zomato for working to help kill this nasty bug. 🙏

Tarun mahour (@sratarun) 's Twitter Profile Photo

Easy way to find BIG-IP Emad Shanab - أبو عبد الله Aditya Shende cat companys |while read url;do test=$(shodan search org:$url http.title:"BIG-IP®-Redirect" | awk '{print $1,$2}');echo -e "\033[32m$url""\033[34m\n$test";done

Easy way to find BIG-IP 
<a href="/Alra3ees/">Emad Shanab - أبو عبد الله</a> <a href="/ADITYASHENDE17/">Aditya Shende</a> 
 
cat companys |while read url;do test=$(shodan search org:$url http.title:"BIG-IP&amp;reg;-Redirect" | awk '{print $1,$2}');echo -e "\033[32m$url""\033[34m\n$test";done
Abhishek Karle (@abhishekkarle3) 's Twitter Profile Photo

I just published How I was able to change victim’s password using IDN Homograph Attack link.medium.com/zSmBpWKg27 Thanks to @musiclouderlml for sharing #bugbountytips

Jason Haddix (@jhaddix) 's Twitter Profile Photo

NYtimes says Twitter hacker used Slack as the "in". I think most of us bounty hunters have found at least one Slack token exposed on Github. Example: hackerone.com/reports/386614 hackerone.com/reports/397527

Intigriti (@intigriti) 's Twitter Profile Photo

Want to find critical bugs by changing a single header? Do just like Corben Leo & set your host header to 'localhost' in your next directory bruteforce, the results might be surprising! 🔥 #BugBountyTip #BugBountyTips

Want to find critical bugs by changing a single header? Do just like <a href="/hacker_/">Corben Leo</a> &amp; set your host header to 'localhost' in your next directory bruteforce, the results might be surprising! 🔥 #BugBountyTip #BugBountyTips
ghostlulz (@ghostlulz1337) 's Twitter Profile Photo

How do you properly hunt on 100k targets? Automation is the key to success when hunting at scale. In my blog post I discuss the techniques and methodology I use while hunting at scale. ghostlulz.com/bug-bounty-aut… #bugbounty #bugbountytip #redteam #xss #osint #infosec

Sapra (@0xsapra) 's Twitter Profile Photo

Extension list for File upload bugs ASP: ".aspx", ".config", ".ashx", ".asmx", ".aspq", ".axd", ".cshtm", ".cshtml", ".rem", ".soap", ".vbhtm", ".vbhtml", ".asa", ".asp", ".cer", "shtml" PHP: php, php5, php3, php2, shtml, html, .php.png(double extension attack)

Abss (@absshax) 's Twitter Profile Photo

Blog's up! "Firebase Cloud Messaging Service Takeover: A small research that led to 30k$+ in bounties" #GoogleVRP writeup included that relays how business rep & every user of Hangouts,Google Play Music, YouTube Go etc were affected! abss.me/posts/fcm-take… #bugbounty #infosec

PortSwigger Research (@portswiggerres) 's Twitter Profile Photo

We've just used Stepper to solve a new Web Security Academy lab. portswigger.net/bappstore/065d… It's a great BApp that allows you to construct multi-step sequences and extract data from any step and re-use that data. This is all done using repeater style tabs.

Somdev Sangwan (@s0md3v) 's Twitter Profile Photo

Use shodan to find HTTP servers of a company that are running on "non-standard" ports. HTTP ASN:<here> -port:80,443,8080 Make sure you are logged in.

m0z (@loosesecurity) 's Twitter Profile Photo

SSRF Bypass list for localhost (127.0.0.1): http://127.1/ http://0000::1:80/ http://[::]:80/ http://2130706433/ http://[email protected] http://0x7f000001/ http://017700000001 http://0177.00.00.01 Also using a redirect to localhost will often work. #bugbountytips

Hack.Sydney (@hcksyd) 's Twitter Profile Photo

Exciting Speaker Announcement for HCKSYD 2023! Introducing Vikas Khanna! Vikas will share his incredible journey of discovery in the world of security. He will reveal two security issues he uncovered in Apple's systems! #HCKSYD23

Exciting Speaker Announcement for HCKSYD 2023! Introducing Vikas Khanna!
Vikas will share his incredible journey of discovery in the world of security. He will reveal two security issues he uncovered in Apple's systems! #HCKSYD23
Black Hat MEA (@blackhatmea) 's Twitter Profile Photo

خذ العلم من محترفين الأمن السيبراني في ورش العمل التقنية في #بلاك_هات23 😎👨‍💻

خذ العلم من محترفين الأمن السيبراني في ورش العمل التقنية في #بلاك_هات23  😎👨‍💻