Bug Bounty
10.5K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
A new Vulnerable Web Application by
@PortSwiggerRes

Gin & Juice Shop: https://ginandjuice.shop
🔥131
Here are some tips for finding CRLF (Carriage Return Line Feed) vulnerability:

1️⃣: Look for places where user input is reflected in the HTTP response header. CRLF vulnerabilities often arise when user input is injected into the header without being properly sanitized.

2️⃣: Try injecting CRLF characters into user input fields to see if they are reflected in the header. For example, you might try inputting a string like "foo%0D%0Abar" into a search field and see if "foo" and "bar" appear as separate lines in the header.

3️⃣: Use a tool like Burp Suite to intercept and modify HTTP requests. This can make it easier to inject CRLF characters and analyze the resulting header.

4️⃣: Pay attention to the content of the header and how it changes based on your input. Look for patterns or anomalies that might indicate a CRLF vulnerability.

5️⃣: Keep in mind that CRLF vulnerabilities can be used to perform a variety of attacks, including HTTP response splitting, header injection, and cache poisoning.

If you suspect that a CRLF vulnerability is present, be sure to thoroughly test and understand its potential impact.

#bugbounty #infosec #cybersecurity #hacking
17👍8
11👍1
BUGOUNTY TIP

Getting a 403 error?
Try appending %2e after the first slash!

https://host.com/path = 403 FORBIDDEN
https://host.com/%2e/path = 200 0K

@rez__
👍33🔥86👏1
When using WayBackUrls, use below Regex
to find parameterized URL(s):

\/[A-Za-z0-9.-][a-z]\?.*=
🔥29👍5👎1
Javascript Question
Mark the correct output
Q) !!"false" == !!"true";
Anonymous Quiz
48%
true
52%
false
😨15🫡6👍3👨‍💻2🔥1🎉1
Javascript Question!!
what is the Length of theArray
Q) let theArrray = [, , , , ,]
Anonymous Quiz
44%
5
34%
6
23%
0
🤯9👍8🤔5
Javascript Question!!
One of these will not give a syntax error!!
Anonymous Quiz
20%
if="A"
15%
null="A"
23%
undefined="A"
42%
All wrong
🤔12😈5
Javascript Question!!

Q) [] == ''
Anonymous Quiz
61%
true
39%
false
Bug Bounty
Javascript Question!!

Q) [] == ''
In JS (==) convert both values in the same type. In this case Empty String and Empty Array both are boolean value of false
So, they evaluate as equal
👍11
Bug Bounty
Javascript Question
Mark the correct output
Q) !!"false" == !!"true";
If a string is not empty == will convert it into boolean value of true so they both are equal 😊
😁6
Are you enjoying JavaScript Quiz!! Polls
Anonymous Poll
81%
Yes 👍
19%
No 🙅‍♂️
👍12👎2😁1
Javascript Question!!
Q: What is the output of the following code?
let x = 1; if (function f(){}) { x += typeof f; }
Anonymous Quiz
32%
Error
34%
"Number"
33%
"1undefined"
👎6🔥3
Type of f is undefined and we are adding typeof f to 1
So it is
"1undefined"
Js Question
const Früh = "foobar";
Will this assignment work ?
Anonymous Quiz
57%
Yes
43%
No
Penetration Testing Certifications

Field Wise Categorized

#bugbounty #infosec #cybersecurity
🔥10👍3