Bug Bounty from Scratch.pdf
11.3 MB
Bug Bounty from Scratch
A comprehensive guide to discovering vulnerabilities and
succeeding in cybersecurity
Francisco Javier Santiago Vázquez
2024
A comprehensive guide to discovering vulnerabilities and
succeeding in cybersecurity
Francisco Javier Santiago Vázquez
2024
Web Application Obfuscation.pdf
1.5 MB
Web Application Obfuscation
‘-/WAFs..Evasion..Filters//alert
(/Obfuscation/)-’
Mario Heiderich
Eduardo Alberto Vela Nava
Gareth Heyes
David Lindsay
‘-/WAFs..Evasion..Filters//alert
(/Obfuscation/)-’
Mario Heiderich
Eduardo Alberto Vela Nava
Gareth Heyes
David Lindsay
🔥MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
✅https://github.com/robotshell/magicRecon
✅https://github.com/robotshell/magicRecon
⚡Google Dorks - Cloud Storage: site:http://s3.amazonaws.com "target[.]com" site:http://blob.core.windows.net "target[.]com" site:http://googleapis.com "target[.]com" site:http://drive.google.com "target[.]com"
👉Find buckets and sensitive data.
Combine:
site:http://s3.amazonaws.com | site:http://blob.core.windows.net | site:http://googleapis.com | site:http://drive.google.com "target[.]com"
Add something to narrow the results: "confidential” “privileged" “not for public release”
✅Credit- Mike Takahashi
👉Find buckets and sensitive data.
Combine:
site:http://s3.amazonaws.com | site:http://blob.core.windows.net | site:http://googleapis.com | site:http://drive.google.com "target[.]com"
Add something to narrow the results: "confidential” “privileged" “not for public release”
✅Credit- Mike Takahashi
💠 Web Recon : A Pentester's Guide to Information Gathering
🔗 https://hacklido.com/blog/968-web-recon-a-pentesters-guide-to-information-gathering
🔗 https://hacklido.com/blog/968-web-recon-a-pentesters-guide-to-information-gathering
HACKLIDO
Web Recon : A Pentester's Guide to Information Gathering
Information gathering or better called reconnaissance is the cornerstone of any Penetration Testing or Bug Bounty exercise. It is simply the act of colle...
💠 Directory Fuzzing and Hidden Resources: Using Ffuf Effectively
🔗 https://hacklido.com/blog/969-directory-fuzzing-and-hidden-resources-using-ffuf-effectively
🔗 https://hacklido.com/blog/969-directory-fuzzing-and-hidden-resources-using-ffuf-effectively
HACKLIDO
Directory Fuzzing and Hidden Resources: Using Ffuf Effectively
Directory fuzzing When browsing through web applications, there can be directories, or files, which are not visible when browsing through application...
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM