Bug Bounty
10.5K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
Amazon S3 bucket Misconfiguration

There are many ways to find an open buckets for your target :

1. Using this tool https://github.com/initstring/cloud_enum
2. Using this website https://buckets.grayhatwarfare.com , blocked in many countries make sure to use VPN

Thread 🧵

https://x.com/Maakthon/status/1713941004431110261?s=20

#bugbountytips #aws #s3 #buckets
🔥11👍41
Store password hashes !!

Credits :
@bytebytego
👍11🔥5
👍17
Short JWT flyer by @sec_r0 ( Rohit )
7👍1🤯1
Burp Suite 101 For Beginners🔥

#1 - Introduction and Installation:
🔗 http://hacklido.com/blog/621

#2 - Understanding Navigation, Dashboard, Configuration:
🔗http://hacklido.com/blog/624

#3 - Exploring Burp Proxy and Target Specification:
🔗http://hacklido.com/blog/625

#4 - Exploring Burp Repeater and Burp Comparer:
🔗http://hacklido.com/blog/628

#5 - Going deep Into intruder:
🔗http://hacklido.com/blog/631

#BurpSuite #Hacking #Infosec #CyberSecurity #RedTeam
18
4 tools to find hidden query parameters! 🛠

A thread! 👇

https://x.com/intigriti/status/1720396304478536139?s=20
🔥6👍51
🔥First Step Toward Web Application Testing : 😎

We will always come across various web applications that are designed and configured differently. One of the most current and widely used methods for testing web applications is the https://github.com/OWASP/wstg/tree/master/document/4-Web_Application_Security_Testing. ❄️

One of the most common procedures is to start by reviewing a web application's front end components, such as HTML, CSS and JavaScript (also known as the front end trinity), and attempt to find vulnerabilities such as Sensitive Data Exposure { https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure } and Cross-Site Scripting (XSS) { https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS) } . 🌓

Once all front end components are thoroughly tested, we would typically review the web application's core functionality and the interaction between the browser and the webserver to enumerate the technologies the webserver uses and look for exploitable flaws. We typically assess web applications from both an unauthenticated and authenticated perspective (if the application has login functionality) to maximize coverage and review every possible attack scenario.
13👍1
🤔Question of the day: How to Spot CORS Misconfigurations?

Tweet by jayesh35_ : https://x.com/Jayesh25_/status/1730131194702958603?s=20
19
🦗CVE : CVE-2023-38146

CVE Series : #1
A High-Risk Windows Themes Vulnerability

• Type: Remote Code Execution (RCE) ⚠️
• Affected Software: Windows 11
• CVSS Score: 8.8 (High Severity)

Dive into the details 🧵:👇

https://x.com/vulncure/status/1732049554504052876?s=20
7👍2🤣1
🦗CVE : CVE-2023-49733

CVE Series : #2
Improper Restriction of XML External Entity Reference in Apache Cocoon

• Type: inject malicious code into XML documents
• Affected Software: Apache Cocoon
• CVSS Score: 9.8 (Critical Severity)
• Impact: RCE

Dive into the details 🧵:👇

https://x.com/vulncure/status/1732817325261283513?s=20
6🔥5👍1