Sajibe Kanti (@sajibekantibd) 's Twitter Profile
Sajibe Kanti

@sajibekantibd

Information Security Consultant @QNAP_nas

RHCSA | RHCE | CCNA | CNSS | VAPT | WordPress Ninja | Bug Bounty Hunter | Smart Contract Auditor | Problem Solver

ID: 745099580

linkhttps://bugcrowd.com/Sajibekanti calendar_today08-08-2012 12:26:25

1,1K Tweet

1,1K Followers

885 Following

AISECUREME (@aisecureme) 's Twitter Profile Photo

This is how to find sql-Injection 100% of the time For site.com/?q=HERE /?q=1 /?q=1' /?q=1" /?q=[1] /?q[]=1 /?q=1` /?q=1\ /?q=1/*'*/ /?q=1/*!1111'*/ /?q=1'||'asd'||' <== concat string /?q=1' or '1'='1 /?q=1 or 1=1 /?q='or''='

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

Recently during initial #recon, I came across a vulnerable Splunk instance which had a sensitive information disclosure vulnerability (P3). Always go deep searching for #exploits and #cves whenever you encounter a third-party service. #BugBountyTip #security #bugbounty #bugs

Recently during initial #recon, I came across a vulnerable Splunk instance which had a sensitive information disclosure vulnerability (P3). 
Always go deep searching for #exploits and #cves whenever you encounter a third-party service. 

#BugBountyTip #security #bugbounty #bugs
M. Qasim Munir (@savitar0x01) 's Twitter Profile Photo

Hussein Daher While inviting users into your account/organization, you can also try inviting company emails and add a new field "password": "example123". or "pass": "example123" in the request. you may end up resetting a user password. #BugBountyTips 1/3

swaysthinking (@swaysthinking) 's Twitter Profile Photo

Hey bountyhunters, here is an honest tip: Don't rely on twitter. Stop consuming what makes other hunters money, and start hunting and getting experience with methodologies, techniques, tools, and bug-classes that work for you. #bugbountytips #bugbounty

Mahendra Purbia (@mah3sec) 's Twitter Profile Photo

A short list of endpoints (From Unknown Resource but thanks to that guy for sharing this with me) #bugbounty #cybersecurity #bugbountytips #bugbountytip #bugcrowd #intigriti #hackerone #bugs #Pentesting

A short list of endpoints (From Unknown Resource but thanks to that guy for sharing this with me)
#bugbounty #cybersecurity #bugbountytips #bugbountytip #bugcrowd #intigriti #hackerone #bugs #Pentesting
BugBountyHunter.com 🪲 (@bugbountyhunt3r) 's Twitter Profile Photo

We just added publicly disclosed issues from HackerOne sorted by vulnerability type so you can learn what types of vulnerabilities to look for on specific programs. More features in the pipeline on the way to help you with your hunt! bugbountyhunter.com/disclosed/

We just added publicly disclosed issues from <a href="/Hacker0x01/">HackerOne</a>  sorted by vulnerability type so you can learn what types of vulnerabilities to look for on specific programs. More features in the pipeline on the way to help you with your hunt!

bugbountyhunter.com/disclosed/
Lobuhi 🍉 (@lobuhisec) 's Twitter Profile Photo

My biggest contribution to github ever made: byp4xx, a simple bash script to bypass 403 forbidden error using methods mentioned in #bugbountytips: github.com/lobuhi/byp4xx/

My biggest contribution to github ever made: byp4xx, a simple bash script to bypass 403 forbidden error using methods mentioned in #bugbountytips:
github.com/lobuhi/byp4xx/
Aditya Shende (@adityashende17) 's Twitter Profile Photo

Burpsuite extension to bypass 403 restricted directory. Installation BurpSuite -> Extender -> Extensions -> Add -> Extension Type: Python -> Select file: 403bypasser.py -> Next till Fininsh. github.com/sting8k/BurpSu…

Aman (@thevyadha) 's Twitter Profile Photo

#bugbounty #bugbountytips Found a $$$$ RCE with CVE-2018-15473 Steps : 1. Found an IP of the company eg: testing.com then cloned the CVE from github.com/Rhynorater/CVE… 2. Ran the command /sshUsernameEnumExploit.py --username root 0.0.0.0 (ip)

Ed (@edoverflow) 's Twitter Profile Photo

Bug bounty tip: is:issue label:Vulnerable and is:issue label:"Edge case" are your friends on github.com/EdOverflow/can…. :)

Bug bounty tip: is:issue label:Vulnerable and is:issue label:"Edge case" are your friends on github.com/EdOverflow/can…. :)
Tuhin Bose (@tuhin1729_) 's Twitter Profile Photo

Jira Vulnerabilities: 1. CVE-2017-9506(SSRF): http://<JIRA>/plugins/servlet/oauth/users/icon-uri?consumerUri=http://bing(.)com 2. CVE-2018-20824(XSS): http://<JIRA>/plugins/servlet/Wallboard/?dashboardId=10000&dashboardId=10000&cyclePeriod=alert(document.domain) (1/n)