Shubham Golam
@golamshubham
Security Consultant
ID: 1064903072252551168
https://shubhamgolam.in 20-11-2018 15:27:32
547 Tweet
202 Followers
263 Following
Yelp disclosed a bug submitted by Lil Endian: hackerone.com/reports/2089042 #hackerone #bugbounty
#0day #research #bugbounty #informationsecurity blog.malicious.group/from-akamai-to… How I *AM* able to abuse Akamai to abuse F5, to abuse all of their customers. This is a bug chain that doesn't require a bug on the target domain to exploit them. But what do I know, I am a freelance nobody.
There's still a load of potential for further research and discoveries in HTTP request smuggling. This massive-impact finding from d3d aka dead (dead, мёртв, 死了) exploiting Akamai/F5 is a great example: blog.malicious.group/from-akamai-to…
AWS S3 Bucket Takeover - How to Find and Maximize Impact by Bug Bounty Reports Explained In this article Greg will tell you how to: - detect - escalate - show impact AWS S3 Bucket Takeovers 😃 blog.vidocsecurity.com/blog/aws-s3-bu… #BugBounty #bugbountytip #blog #CyberSec #Cybersecurity
After months of work (and bugs), Maxence SCHMITT has finally released his fabulous research. Exploiting Client-Side Path Traversal to Perform Cross-Site Request Forgery or #CSPT2CSRF. Full paper here: doyensec.com/resources/Doye… Summary in blog.doyensec.com/2024/07/02/csp…
How to exploit Android deeplinks by b33f | 🇺🇦✊ knifecoat.com/Posts/Tell+you… #BBRENewsletter77
Just got a reward for a high vulnerability submitted on YesWeHack ⠵ - Vuln: DoS via web cache poisoning - Payload: {Content-Type: text/html; charset=invalid-charset, Content-Encoding: xxxx} - Tool: HExHTTP: github.com/c0dejump/HExHT… & top 200 now ! 😁 #YesWeRHackers #BugBounty
Just finished a web VAPT for an e-com client. They’d already done 2 rounds before… we still pulled out a payment bypass + PII disclosure Client shocked Team Bounters rocked! #VAPT #infosec #BugBounty #CyberSecurity #pentest