Bug Bounty
10.5K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
🦗CVE : CVE-2023-49070

CVE Series : #3
Apache OFBiz Pre-authentication RCE Vulnerability

• Type: Code injection (CWE-94)⚠️
• Affected Software: Apache OFBiz versions prior to 18.12.10
• CVSSv3 Base Score: 9.8 (Critical Severity)

Dive into the details 🧵:👇

https://x.com/vulncure/status/1733545000363819108?s=20
🔥9👍2👏1
Bugbounty Reports in Thread🧵

Bug: Blind SQL injection on id\.indrive\.com

Type: SQL Injection
Program: inDrive
Siverity: Critical (9 ~ 10)
Bounty: $4,134

Dive into the details 🧵:📷

https://x.com/vulncure/status/1734908685103575408?s=20
12👍4🔥2🤡1
Guys we are taking a live session for Bug Hunter & Pentesters at Sun 16 dec IST.
Anonymous Poll
48%
Time : 9PM IST
52%
Time : 10PM IST
Note📌 : This Meet is going to be Simple & easy with normal day to day question in 🐛 bug hunter's life

Lang : Hindi

At 10PM IST Tomorrow { Telegram's Channel Meet }
😢15👍6🍾4😁3
Live stream scheduled for
Live stream started
Live stream finished (1 hour)
Thank You Guys, So much for joining the Meet 🌿🍁

Special thanks 👍 To Our Team:

1. twitter.com/Anukulhexx
2. twitter.com/hack_learners
3. twitter.com/radhasec
4. twitter.com/TecholicKamal
5. twitter.com/RajNamdevv

For handling this Meet
9👍1
PART 1
🍏 Let's Exploit the Nodejs Application :

https://x.com/vulncure/status/1736816422217527727?s=20
🔥7👍4👌1
PART 2 ⤵️

🍏 Exploit Nodejs Application To RCE

In Part 1, We talked about the Nodejs global process that can used to get better control over system interactions

We sawn that Nodejs Application wouldn't have sanitized the eval() .

Well, Now we'll deal with the file system of instance running Nodejs Application

Read More :

https://x.com/vulncure/status/1737169125267415403?s=20
6😱1
🎉 Happy New Year Guys 🎊

Hope you're doing well and if not, you have new year to start with new mindset and methodology to Succeed

All the Best 🥳
23🎉4👍2👏2👀1
IDOR.pdf
78.5 KB
Series #1
Top Known Bug Checklist

IDOR.pdf Checklist 🔻👇

#bugbounty #infosec
🔥31👍72👀1
2FA Bypass.pdf
301.4 KB
Series #2
Top Known Bug Checklist

2FA Checklist 🔻👇

#bugbounty #infosec
🔥25👍43😁1
reset pass checklist.pdf
97.4 KB
Series #3
Top Known Bug Checklist

Passwd Reset Checklist 🔻👇

#bugbounty #infosec
14🔥6👍3🕊1
🚨Bounty Tips Collected From Twitter🚨.pdf
225.9 KB
Series #4
Top Known Bug Checklist

Tips From Twitter Community🔻👇

#bugbounty #infosec
❤‍🔥8🔥5👍42👌2
PART - #1 🕵️‍♂️🛠
Let's Crack The Jenkins Instance 🔓


https://x.com/vulncure/status/1743241088968638513?s=20
👍7🔥32🌭1
Upload Function Exploit Techniques.📚

#infosec #bugbountytip #cybersecurity
🔥13👍21👏1
Some Shodan Dorks that might useful in Bug Bounty.

1. org:"http://target. com"
2. http.status:"<status_code>"
3. product:"<Product_Name>"
4. port:<Port_Number> “Service_Message”
5. port:<Port_Number> “Service_Name”
6. http.component:"<Component_Name>"
7. http.component_category:"<Component_Category>
8. http.waf:"<firewall_name>"
9. http.html:"<Name>"
10. http.title:"<Title_Name>"
11. ssl.alpn:"<Protocol>"
12. http.favicon.hash:"<Favicon_Hash>"
13. net:"<Net_Range>" (for e.g. 104.16.100.52/32)
14. http://ssl.cert.subject.cn:"<http://Domain .com>"
15. asn:"<ASnumber>"
16. hostname:"<hosthame>"
17. ip:"<IP_Address>"
18. all:"<Keyword>"
19. “Set-Cookie: phpMyAdmin”
20. “Set-Cookie: lang="
21. “Set-Cookie: PHPSESSID"
22. “Set-Cookie: webvpn”
23. “Set-Cookie:webvpnlogin=1"
24. “Set-Cookie:webvpnLang=en”
25. “Set-Cookie: mongo-express="
26. “Set-Cookie: user_id="
27. “Set-Cookie: phpMyAdmin="
28. “Set-Cookie: _gitlab_session”
29. “X-elastic-product: Elasticsearch”
30. “x-drupal-cache”
31. “access-control-allow-origin”
32. “WWW-Authenticate”
33. “X-Magento-Cache-Debug”
34. “kbn-name: kibana”
🔥175👍3👌32