ReconOne (@reconone_bk) 's Twitter Profile
ReconOne

@reconone_bk

Tweet about Bug Bounty, Recon, Recon Tips and Attack Surface Management.

ID: 1560175842537472001

linkhttps://linktr.ee/reconone calendar_today18-08-2022 08:04:52

1,1K Tweet

19,19K Takipçi

53 Takip Edilen

ReconOne (@reconone_bk) 's Twitter Profile Photo

ffuf is used by hundreds of people But only a few use the tool effectively. Here are 9 tips you want to know right away 👇 🧵 #bugbountytips #bugbounty #recon #ffuf

ffuf is used by hundreds of people

But only a few use the tool effectively.

Here are 9 tips you want to know right away 👇 🧵

#bugbountytips #bugbounty #recon #ffuf
ReconOne (@reconone_bk) 's Twitter Profile Photo

Stay updated with "The Top 25 Recon Tools and their purpose" 👇 #recon #BugBounty #AttackSurface #cybersecurity #recontips #infographics #bugbountytips

Stay updated with "The Top 25 Recon Tools and their purpose" 👇

#recon #BugBounty #AttackSurface #cybersecurity #recontips #infographics #bugbountytips
ReconOne (@reconone_bk) 's Twitter Profile Photo

Finding and analyzing JavaScript files is increasingly important for identifying creative and impactful bugs. Check out this helpful video on the topic, from #NahamCon2024 👇 youtu.be/fQoxjBwQZUA?si… #BugBounty #bugbountytips #recon #recontips #cybersecurity #infosec

ReconOne (@reconone_bk) 's Twitter Profile Photo

Logical Bugs are often invisible to scanners They live in the assumptions devs make Want to find them? Think like the app shouldn’t work Here are 6 strategies to uncover logic bugs (with examples): #bugbounty #websec #cybersecurity

Logical Bugs are often invisible to scanners
They live in the assumptions devs make
Want to find them? Think like the app shouldn’t work

Here are 6 strategies to uncover logic bugs (with examples):
#bugbounty #websec  #cybersecurity
shubs (@infosec_au) 's Twitter Profile Photo

Today, we're releasing the new Searchlight Cyber (Searchlight Cyber) tools website, which allows you to use several of our open-source tools for free via a web interface. You can self-register at tools.slcyber.io (+ all our wordlists will be released there from now on!)

YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

SQL injection vulnerabilities remain widespread – and potentially lucrative for #BugBounty hunters 💉Our ‘Vulnerability Vectors’ series kicks off with techniques – such as blind SQLi, time-based attacks and OOB callbacks – for this classic CWE 👇 yeswehack.com/learn-bug-boun…

Web Security Academy (@websecacademy) 's Twitter Profile Photo

How to manually check for CL.TE Request Smuggling Vulnerabilities: 1️⃣ See if a GET request accepts POST 2️⃣ See if it accepts HTTP/1 3️⃣ Disable "Update Content-Length" 4️⃣ Send with CL & TE headers: POST / HTTP/1.1 Host: <HOST-URL> Content-Length: 6 Transfer-Encoding: chunked 0

chux (@chux13786509) 's Twitter Profile Photo

Bug Hunters Tip 💥 Always search your targets in SwaggerHub 🔥 While digging through a target’s SwaggerHub docs, I discovered an exposed valid token, helping me to escalate my privs on the target 💪 Got more useful tips for finding secrets during recon? Drop your tips below 👇

Bug Hunters Tip 💥
Always search your targets in SwaggerHub 🔥
While digging through a target’s SwaggerHub docs, I discovered an exposed valid token, helping me to escalate my privs on the target 💪
Got more useful tips for finding secrets during recon?
Drop your tips below 👇
manuel valdez⛩️ (@saur1n) 's Twitter Profile Photo

Stoked to share my first ever writeup of how I found a blind XXE just by playing with a PDF upload feature and spotting an old, vulnerable iText library. Hope you like it! saurinn.github.io/blog/xxe-oob-v… #bugbountytips

devire (@thedevire) 's Twitter Profile Photo

There's no secret recipe or roadmap to find high & critical bugs. Although there are many niche bugs which require a lot of experience to find and exploit. Other than that it's all about.. 1/n

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

Regex is a powerful tool nobody talks about enough. Whether you’re hunting secrets, combing through massive data dumps, or using it for your recon game, it always delivers! Check out my video here: 👉🏼 youtu.be/SWP8o_W0U3M

Regex is a powerful tool nobody talks about enough. Whether you’re hunting secrets, combing through massive data dumps, or using it for your recon game, it always delivers!  Check out my video here: 👉🏼 youtu.be/SWP8o_W0U3M