Bug Bounty
10.5K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
🔰 CRLF Vulnerability

• CRLF stands for "Carriage Return, Line Feed." It is a sequence of two characters used to signify the end of a line of text in many computer systems.

• How It Occurs

A CRLF injection vulnerability occurs when an attacker is able to inject a CRLF sequence into an application, often by manipulating input that is not properly validated

This can allow the attacker to alter the behavior of the application

• Way To Protect CRLF Vulnerability

To protect against CRLF injection attacks, it is important to properly validate and sanitize all user input.

This can help to ensure that malicious input is not able to be injected into the application.

#bugbounty #Infosec #penetrationtesting #hacking #bugbountytips
👍13🔥4😁21👏1
A new Vulnerable Web Application by
@PortSwiggerRes

Gin & Juice Shop: https://ginandjuice.shop
🔥131
Here are some tips for finding CRLF (Carriage Return Line Feed) vulnerability:

1️⃣: Look for places where user input is reflected in the HTTP response header. CRLF vulnerabilities often arise when user input is injected into the header without being properly sanitized.

2️⃣: Try injecting CRLF characters into user input fields to see if they are reflected in the header. For example, you might try inputting a string like "foo%0D%0Abar" into a search field and see if "foo" and "bar" appear as separate lines in the header.

3️⃣: Use a tool like Burp Suite to intercept and modify HTTP requests. This can make it easier to inject CRLF characters and analyze the resulting header.

4️⃣: Pay attention to the content of the header and how it changes based on your input. Look for patterns or anomalies that might indicate a CRLF vulnerability.

5️⃣: Keep in mind that CRLF vulnerabilities can be used to perform a variety of attacks, including HTTP response splitting, header injection, and cache poisoning.

If you suspect that a CRLF vulnerability is present, be sure to thoroughly test and understand its potential impact.

#bugbounty #infosec #cybersecurity #hacking
17👍8
11👍1
BUGOUNTY TIP

Getting a 403 error?
Try appending %2e after the first slash!

https://host.com/path = 403 FORBIDDEN
https://host.com/%2e/path = 200 0K

@rez__
👍33🔥86👏1
When using WayBackUrls, use below Regex
to find parameterized URL(s):

\/[A-Za-z0-9.-][a-z]\?.*=
🔥29👍5👎1
Javascript Question
Mark the correct output
Q) !!"false" == !!"true";
Anonymous Quiz
48%
true
52%
false
😨15🫡6👍3👨‍💻2🔥1🎉1
Javascript Question!!
what is the Length of theArray
Q) let theArrray = [, , , , ,]
Anonymous Quiz
44%
5
34%
6
23%
0
🤯9👍8🤔5
Javascript Question!!
One of these will not give a syntax error!!
Anonymous Quiz
20%
if="A"
15%
null="A"
23%
undefined="A"
42%
All wrong
🤔12😈5
Javascript Question!!

Q) [] == ''
Anonymous Quiz
61%
true
39%
false
Bug Bounty
Javascript Question!!

Q) [] == ''
In JS (==) convert both values in the same type. In this case Empty String and Empty Array both are boolean value of false
So, they evaluate as equal
👍11
Bug Bounty
Javascript Question
Mark the correct output
Q) !!"false" == !!"true";
If a string is not empty == will convert it into boolean value of true so they both are equal 😊
😁6
Are you enjoying JavaScript Quiz!! Polls
Anonymous Poll
81%
Yes 👍
19%
No 🙅‍♂️
👍12👎2😁1
Javascript Question!!
Q: What is the output of the following code?
let x = 1; if (function f(){}) { x += typeof f; }
Anonymous Quiz
32%
Error
34%
"Number"
33%
"1undefined"
👎6🔥3
Type of f is undefined and we are adding typeof f to 1
So it is
"1undefined"
Js Question
const Früh = "foobar";
Will this assignment work ?
Anonymous Quiz
57%
Yes
43%
No