Bug Bounty 🪲 Tip:
Target had a /?back= parameter,
but payloads like javascript://alert(1) did not work.
Exploited using the following with URL-encoded ASCII tab characters:
%09Jav%09ascript:alert(document.domain)
#bugbountytips #bugbounty
Target had a /?back= parameter,
but payloads like javascript://alert(1) did not work.
Exploited using the following with URL-encoded ASCII tab characters:
%09Jav%09ascript:alert(document.domain)
#bugbountytips #bugbounty
👍23🔥6
The Game of HTTP Request And Response
https://bugbountyguide.org/2022/12/23/understand-the-game-of-http-request-and-response/
#bugbounty #Infosec
https://bugbountyguide.org/2022/12/23/understand-the-game-of-http-request-and-response/
#bugbounty #Infosec
👍13
All Network Services & Ports with Enumeration techniques
https://bugbountyguide.org/2022/12/24/all-network-services-ports-enumeration/
https://bugbountyguide.org/2022/12/24/all-network-services-ports-enumeration/
🔥14👍4❤2
✨ Huge Bug Bounty Mindmap
https://bugbountyguide.org/bug-bounty/mindmaps-cheatsheets#Bug-bounty-mindmap
https://bugbountyguide.org/bug-bounty/mindmaps-cheatsheets#Bug-bounty-mindmap
👍14🔥4
Web Application Security Mindmap
https://bugbountyguide.org/bug-bounty/mindmaps-cheatsheets/#Web%20Application%20Security%20Mindmap
#bugbounty #infosec
https://bugbountyguide.org/bug-bounty/mindmaps-cheatsheets/#Web%20Application%20Security%20Mindmap
#bugbounty #infosec
👍8🔥2
An interesting trick: you can bypass a WAF during a XSS attack on ASP(dot)NET/IIS technology by using a HTTP parameter pollution attack.
#BugBounty #BugBountyTips #InfoSec
(Credit to Acunetix)
Full article: https://acunetix.com/blog/whitepaper-http-parameter-pollution/
#BugBounty #BugBountyTips #InfoSec
(Credit to Acunetix)
Full article: https://acunetix.com/blog/whitepaper-http-parameter-pollution/
❤13🔥4
Tryhackme voucher at a cheap price.
At Rs 155 / 2.2$ for a month
This guy is providing @Infosec_lover | Verified by me
At Rs 155 / 2.2$ for a month
This guy is providing @Infosec_lover | Verified by me
❤9
& All Hacking - Offensive security, bug bounty Ebooks Available DM this guy @Infosec_lover
👍9
4 🙌 Ways to become a bug bounty hunter
1️⃣ Clear your web fundamentals first
2️⃣ practice this on Tryhackme and any other place that you know well
3️⃣ Complete portswigger labs
4️⃣ Last but not the least: Read bug bounty reports as much as possible, This will give you a good understanding of how the web actually works and you would be able to think like a bug hunter
1️⃣ Clear your web fundamentals first
2️⃣ practice this on Tryhackme and any other place that you know well
3️⃣ Complete portswigger labs
4️⃣ Last but not the least: Read bug bounty reports as much as possible, This will give you a good understanding of how the web actually works and you would be able to think like a bug hunter
❤38👍10🔥5😁2
If an unsafe logger is used, an attacker can inject code and execute arbitrary commands, even if the page being accessed is a 404 page.
Always test HTTP request headers to make sure the application is handling the headers correctly.
Always test HTTP request headers to make sure the application is handling the headers correctly.
👍17🔥4