7 Overlooked recon techniques to find more vulnerabilities
https://www.intigriti.com/researchers/blog/hacking-tools/7-overlooked-recon-techniques-to-find-more-vulnerabilities
https://www.intigriti.com/researchers/blog/hacking-tools/7-overlooked-recon-techniques-to-find-more-vulnerabilities
Intigriti
7 Overlooked recon techniques to find more vulnerabilities
Reconnaissance is an important phase in bug bounty and in pentesting in general. As every target is unique and as we often do not have access to the code base, we'd need to come up with unique methods...
👍2
💻 All About Bug Bounty - Updated!
🔥https://github.com/daffainfo/AllAboutBugBounty
🔥https://github.com/daffainfo/AllAboutBugBounty
1-Click Account Takeover (ATO) via CORS Misconfiguration: https://medium.com/@mohammed01550038865/1-click-account-takeover-ato-via-cors-misconfiguration-64dc26d24917?source=rss------bug_bounty-5
Medium
1-Click Account Takeover (ATO) via CORS Misconfiguration
Hello All, Today, I will share an important write-up I found on a private bug bounty on Bugcrowd. I will refer to my victim target as…
Mastering Bug Bounty Recon: Essential Techniques for Ethical Hackers: https://medium.com/@verylazytech/mastering-bug-bounty-recon-essential-techniques-for-ethical-hackers-549c5b472975?source=rss------bug_bounty-5
Medium
Mastering Bug Bounty Recon: Essential Techniques for Ethical Hackers
The first step to attacking any target is conducting reconnaissance, or simply put, gathering information about the target. Reconnaissance…
OAuth Account Hijacking via redirect_uri: https://osintteam.blog/oauth-account-hijacking-via-redirect-uri-ae8ca7a66930?source=rss------bug_bounty-5
Medium
OAuth Account Hijacking via redirect_uri
Today, we’ll be walking through my step-by-step methodology as I approach an Oauth vulnerability. This is part of my Methodology…
How I Bypassed OTP Like a Devil, Leading to Full Account Takeover: https://infosecwriteups.com/how-i-bypassed-otp-like-a-devil-leading-to-full-account-takeover-7bb7a673f7a0?source=rss------bug_bounty-5
Medium
How I Bypassed OTP Like a Devil, Leading to Full Account Takeover
Introduction:
How I Earned Over 100 Points on HackerOne with Email Spoofing.: https://j0nasdias.medium.com/how-i-earned-over-100-points-on-hackerone-with-email-spoofing-1ae0c4bc6aba?source=rss------bug_bounty-5
Medium
How I Earned Over 100 Points on HackerOne with Email Spoofing.
Hello, my name is Jonas Dias Rebelo, I am currently 21 years old, born in Portugal and now residing in the USA (United States of America).
IDOR leads to leak private user’s data: https://medium.com/@banertheinrich/idor-leads-to-leak-private-users-data-3a2b59f58826?source=rss------bug_bounty-5
Medium
IDOR leads to leak private user’s data
Introduction بسم الله الرحمن الرحيم و الصلاة و السلام على أشرف المرسلين Hello! My name is Adham Heinrich, and this is my second write-up…
Bug Bounty Findings: 10 Major Vulnerabilities Exposed in Cloverleaf’s Application - Open Redirect …: https://medium.com/@maakthon/bug-bounty-findings-10-major-vulnerabilities-exposed-in-cloverleafs-web-application-part-1-95f659ff7d0a?source=rss------bug_bounty-5
Medium
Bug Bounty Insights: 10 Key Findings - Open Redirect - Part 1
This article explores 10 security vulnerabilities found in a web application, called app.target.me for privacy. Each issue is described along with its impact and suggested fixes. The vulnerabilities…
How to Find and Identify Race Condition Vulnerabilities as a Penetration Tester: https://cyberw1ng.medium.com/how-to-find-and-identify-race-condition-vulnerabilities-as-a-penetration-tester-9d9ecce6ed56?source=rss------bug_bounty-5
Medium
How to Find and Identify Race Condition Vulnerabilities as a Penetration Tester
Understand the Basics of Race Conditon
Critical Alert: Hackers Exploit Hunk Companion WordPress Plugin!: https://medium.com/@wiretor/critical-alert-hackers-exploit-hunk-companion-wordpress-plugin-50fcf5834f84?source=rss------bug_bounty-5
Medium
🚨 Critical Alert: Hackers Exploit Hunk Companion WordPress Plugin! 🚨
WIRE TOR — The Ethical Hacking Services
Hack The Box Academy — File Inclusion — Skills Assessment: https://medium.com/@d4nglz17/hack-the-box-academy-file-inclusion-skills-assessment-1ca0283a9a06?source=rss------bug_bounty-5
Medium
Hack The Box Academy — File Inclusion — Skills Assessment
Ok, time to check them skillz on File Inclusion — We’re presented with an IP and Port to test and just one question:
How a Race Condition Became an Account Takeover Vulnerability: https://medium.com/@mrasg/how-a-race-condition-became-an-account-takeover-vulnerability-756f14990f38?source=rss------bug_bounty-5
Medium
How a Race Condition Became an Account Takeover Vulnerability
I’m excited to share a unique vulnerability journey with you — a race condition that transformed into an Account Takeover (ATO) exploit
Simplifying Reconnaissance: Building a Custom Bug Hunting Discord Bot: https://medium.com/@najeebkm010/simplifying-reconnaissance-building-a-custom-bug-hunting-discord-bot-6792ab4249bf?source=rss------bug_bounty-5
Medium
Simplifying Reconnaissance: Building a Custom Bug Hunting Discord Bot
In the ever-evolving landscape of cybersecurity, efficiency and automation are key to successful reconnaissance and vulnerability…
Exploiting API Rate Limiting: Bypassing Restrictions: https://medium.com/@bootstrapsecurity/exploiting-api-rate-limiting-bypassing-restrictions-c89a1bd61aee?source=rss------bug_bounty-5
Medium
Exploiting API Rate Limiting: Bypassing Restrictions
APIs control how users interact with applications. Rate limiting stops users from sending too many requests in a short time. It’s a way to…
❤1