Bug Bounty
10.6K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
Get Reverse Shell

Using Bash, Netcat(Window & Kali), Netcat(Without -e Option), Python, Perl, Php

Read For More
https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet?source=post_page---------------------------


#cybersecurity #hacking #bugbounty #infosec #reverse_shell

Join My Telegram Group For More like This 🔥👍: https://t.me/bugbountyresources
1
Bypass 304 (Not Modified #bugbountytip

Request :

GET /admin HTTP/1.1
Host: http://target.com

If-None-Match: W/"32-IuK7rSIJ92ka0c92kld"

Delete "If-None-Match" header
Adding random character in the end of "If-None-Match" header

Join Group For More:
https://t.me/bugbountyresources

#cybersecurity #hacking #bugbounty
👍3
Channel name was changed to «Bug bounty Tips | Infosec Community Resources»
Security Hardening Guides🌵

Collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.

Link :🔗
https://github.com/decalage2/awesome-security-hardening

Join Group For More:
https://t.me/bugbountyresources

#cybersecurity #hacking #bugbounty #bugbountytips #infosec
🔥2
🎆Bypass 403🎆 #bugbountytips

🏹Using "X-Original-URL" header :
. . .
Request :
GET /admin HTTP/1.1
Host: http://target.com


Try this to bypass with
. . .
GET /anything HTTP/1.1
Host: http://target.com

X-Original-URL: /admin

🏹Appending %2e after the first slash
. . .
Request :
http://target.com/admin
=> 403

Try to Bypass with
. . .
http://target.com/%2e/admin
=> 200

🏹Try add dot (.) slash (/) and semicolon (;) in the URL
. . .
http://target.com/admin
=> 403

Try to Bypass with
. . .
http://target.com/secret/
. => 200
http://target.com//secret//
=> 200
http://target.com/./secret/
.. => 200
http://target.com/;/secret
=> 200
http://target.com//;//secret
=> 200

🏹Add "..;/" after the directory name
. . .
http://target.com/admin
=> 403

Try this to bypass using ..;/
http://target.com/admin..;/
=> 200

🏹Try to uppercase the alphabet in the url
. . .
http://target.com/admin
=> 403

Try with UPPERCASE :
http://target.com/aDmIN
=> 200

🏹Via Web Cache Poisoning
. . .

GET /anything HTTP/1.1
Host: http://victim.com

X­-Original-­URL: /admin
👍4
Server Side Request Forgery(SSRF) #bugbounty #bugbountytips #infosec #cybersecurity

🏹Use The Whole IP Range For Testing SSRF (198.0.0.1-255)

🏹use Different Encoding Schemes of https://127.O.O.1
Hex Encoding https://Ox7f.OxO.OxO.Ox1
Octal Encoding https://0177.O.O.01
Dword Encoding https://2130706433
URL Encoding https://%6c%6f%63%61%6c%68%6f%73%74
Mixed Encoding https://0177.O.O.Ox1
Also use 2130706433 or 0177øWWB1
🏹Obfuscate Strings In URL Encode or Case Transformation (Blocked Words Bypass)

🏹Use Registered Domain Names That Resolves To 127.0.0.1

🏹Embed Credentials : https://attacker@victim.com

🏹use URL Fragments '#' : https://attacker'#'victim.com (Remome the " over the hash)

🏹Use DNS Subdomain Method : https://victim.com.evil.com

🏹Use Directory Method : https://attacker.com/victim.com

🏹Exploit Redirecting The Target

🏹Change The Referrer To Burp Collaborator [Blind Exploit)

🏹Use IPv6 addresses instead of IPv4

🏹Usable Protocols:
gopher : //
file: //
dict://
👍7
Find Subdomain from VirusTotal🔥
Bash One-liner 🌵#bugbountytips #infosec #bugbounty

curl -s "https ://www.virustotal.com/ui/domains/domain.com/subdomains?limit=40" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u
👍2
image.png
429.1 KB
🌱 🔥 🌵 SMB Enumeration 🌵 🔥 🌱
2👍2
Some General Info You should Look for
before Web PenTesting 🤩🔥

See :☝🏻#bugbounty #infosec
👍3
HTTP Status Code Cheat Sheet 🔥🌵

#bugbounty #infosec
🔥3
🔥🌵😲8000+ Xss Payloads🌵😲🔥
#bugbounty #infosec

Git ripo : https://github.com/Aacle/xss_payload

#bugbounty #infosec
👌3🔥1
Web Cache Poisoning🌱🌵🔥
#bugbounty #infosec

The objective of web cache poisoning is to send a request that causes a harmful response that gets saved in the cache and served to other users.

Where to find 🧵(1/n) :👇 Complete Thread

https://twitter.com/Aacle_/status/1588199064780537856?s=20&t=G9tW-LmTpkn9SteflrprpQ
👍6
6 Bugbounty Tips 😀🤩 from @EdOverflow

#infosec #bugbountytip ☝🏻
🥰2👍1