Bug Bounty
10.5K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
Happy happy happy new year 🥳

May the new year 2023 bring joy, prosperity, and all the things you wish for.
29
A Gift From My Side

2 x 1-month Tryhackme Voucher: https://tryhackme.com/voucher/stats/B8MMeLOTPAx8NF
😢145🔥4👍2
Don't worry After exactly 30m - Another 2x1-month Tryhackme Voucher giveaway
15👍3🤡2🤣1🫡1
😢208🤬4🔥3👍1😁1
if Anybody wants to purchase at a cheap price, can contact @infosec_lover
4🔥3🤡3👍1
Someone asked me to give some tips to pwn Admin Panel. Here are some basic ways to find the admin panel and bypass it. I learned most of it from Portswigger Lab Academy and It works whenever I apply on a real target.

#bugbountytips #bugbounty
👍34🔥1
👍7🔥2
🔰 CRLF Vulnerability

• CRLF stands for "Carriage Return, Line Feed." It is a sequence of two characters used to signify the end of a line of text in many computer systems.

• How It Occurs

A CRLF injection vulnerability occurs when an attacker is able to inject a CRLF sequence into an application, often by manipulating input that is not properly validated

This can allow the attacker to alter the behavior of the application

• Way To Protect CRLF Vulnerability

To protect against CRLF injection attacks, it is important to properly validate and sanitize all user input.

This can help to ensure that malicious input is not able to be injected into the application.

#bugbounty #Infosec #penetrationtesting #hacking #bugbountytips
👍13🔥4😁21👏1
A new Vulnerable Web Application by
@PortSwiggerRes

Gin & Juice Shop: https://ginandjuice.shop
🔥131
Here are some tips for finding CRLF (Carriage Return Line Feed) vulnerability:

1️⃣: Look for places where user input is reflected in the HTTP response header. CRLF vulnerabilities often arise when user input is injected into the header without being properly sanitized.

2️⃣: Try injecting CRLF characters into user input fields to see if they are reflected in the header. For example, you might try inputting a string like "foo%0D%0Abar" into a search field and see if "foo" and "bar" appear as separate lines in the header.

3️⃣: Use a tool like Burp Suite to intercept and modify HTTP requests. This can make it easier to inject CRLF characters and analyze the resulting header.

4️⃣: Pay attention to the content of the header and how it changes based on your input. Look for patterns or anomalies that might indicate a CRLF vulnerability.

5️⃣: Keep in mind that CRLF vulnerabilities can be used to perform a variety of attacks, including HTTP response splitting, header injection, and cache poisoning.

If you suspect that a CRLF vulnerability is present, be sure to thoroughly test and understand its potential impact.

#bugbounty #infosec #cybersecurity #hacking
17👍8
11👍1
BUGOUNTY TIP

Getting a 403 error?
Try appending %2e after the first slash!

https://host.com/path = 403 FORBIDDEN
https://host.com/%2e/path = 200 0K

@rez__
👍33🔥86👏1
When using WayBackUrls, use below Regex
to find parameterized URL(s):

\/[A-Za-z0-9.-][a-z]\?.*=
🔥29👍5👎1
Javascript Question
Mark the correct output
Q) !!"false" == !!"true";
Anonymous Quiz
48%
true
52%
false
😨15🫡6👍3👨‍💻2🔥1🎉1
Javascript Question!!
what is the Length of theArray
Q) let theArrray = [, , , , ,]
Anonymous Quiz
44%
5
34%
6
23%
0
🤯9👍8🤔5
Javascript Question!!
One of these will not give a syntax error!!
Anonymous Quiz
20%
if="A"
15%
null="A"
23%
undefined="A"
42%
All wrong
🤔12😈5