🎉 Happy New Year Guys 🎊
Hope you're doing well and if not, you have new year to start with new mindset and methodology to Succeed
All the Best 🥳
Hope you're doing well and if not, you have new year to start with new mindset and methodology to Succeed
All the Best 🥳
❤23🎉4👍2👏2👀1
IDOR.pdf
78.5 KB
🔥31👍7⚡2👀1
2FA Bypass.pdf
301.4 KB
🔥25👍4❤3😁1
reset pass checklist.pdf
97.4 KB
❤14🔥6👍3🕊1
🚨Bounty Tips Collected From Twitter🚨.pdf
225.9 KB
❤🔥8🔥5👍4❤2👌2
PART - #1 🕵️♂️🛠
Let's Crack The Jenkins Instance 🔓
https://x.com/vulncure/status/1743241088968638513?s=20
Let's Crack The Jenkins Instance 🔓
https://x.com/vulncure/status/1743241088968638513?s=20
👍7🔥3⚡2🌭1
Some Shodan Dorks that might useful in Bug Bounty.
1. org:"http://target. com"
2. http.status:"<status_code>"
3. product:"<Product_Name>"
4. port:<Port_Number> “Service_Message”
5. port:<Port_Number> “Service_Name”
6. http.component:"<Component_Name>"
7. http.component_category:"<Component_Category>
8. http.waf:"<firewall_name>"
9. http.html:"<Name>"
10. http.title:"<Title_Name>"
11. ssl.alpn:"<Protocol>"
12. http.favicon.hash:"<Favicon_Hash>"
13. net:"<Net_Range>" (for e.g. 104.16.100.52/32)
14. http://ssl.cert.subject.cn:"<http://Domain .com>"
15. asn:"<ASnumber>"
16. hostname:"<hosthame>"
17. ip:"<IP_Address>"
18. all:"<Keyword>"
19. “Set-Cookie: phpMyAdmin”
20. “Set-Cookie: lang="
21. “Set-Cookie: PHPSESSID"
22. “Set-Cookie: webvpn”
23. “Set-Cookie:webvpnlogin=1"
24. “Set-Cookie:webvpnLang=en”
25. “Set-Cookie: mongo-express="
26. “Set-Cookie: user_id="
27. “Set-Cookie: phpMyAdmin="
28. “Set-Cookie: _gitlab_session”
29. “X-elastic-product: Elasticsearch”
30. “x-drupal-cache”
31. “access-control-allow-origin”
32. “WWW-Authenticate”
33. “X-Magento-Cache-Debug”
34. “kbn-name: kibana”
1. org:"http://target. com"
2. http.status:"<status_code>"
3. product:"<Product_Name>"
4. port:<Port_Number> “Service_Message”
5. port:<Port_Number> “Service_Name”
6. http.component:"<Component_Name>"
7. http.component_category:"<Component_Category>
8. http.waf:"<firewall_name>"
9. http.html:"<Name>"
10. http.title:"<Title_Name>"
11. ssl.alpn:"<Protocol>"
12. http.favicon.hash:"<Favicon_Hash>"
13. net:"<Net_Range>" (for e.g. 104.16.100.52/32)
14. http://ssl.cert.subject.cn:"<http://Domain .com>"
15. asn:"<ASnumber>"
16. hostname:"<hosthame>"
17. ip:"<IP_Address>"
18. all:"<Keyword>"
19. “Set-Cookie: phpMyAdmin”
20. “Set-Cookie: lang="
21. “Set-Cookie: PHPSESSID"
22. “Set-Cookie: webvpn”
23. “Set-Cookie:webvpnlogin=1"
24. “Set-Cookie:webvpnLang=en”
25. “Set-Cookie: mongo-express="
26. “Set-Cookie: user_id="
27. “Set-Cookie: phpMyAdmin="
28. “Set-Cookie: _gitlab_session”
29. “X-elastic-product: Elasticsearch”
30. “x-drupal-cache”
31. “access-control-allow-origin”
32. “WWW-Authenticate”
33. “X-Magento-Cache-Debug”
34. “kbn-name: kibana”
🔥17❤5👍3👌3⚡2
Bugbounty Reports in Threads 🧵
Bug : HTML sanitizer that allows an attacker to inject arbitrary unsafe HTML into emails, potentially lead to account compromise for hey .com's users who view the malicious emails
Type: XSS
Company: Basecamp
Siverity: Critical (9 ~ 10)
Bounty: $5,000
Dive into the details 🧵:📷
https://x.com/vulncure/status/1744002060016591097?s=20
Bug : HTML sanitizer that allows an attacker to inject arbitrary unsafe HTML into emails, potentially lead to account compromise for hey .com's users who view the malicious emails
Type: XSS
Company: Basecamp
Siverity: Critical (9 ~ 10)
Bounty: $5,000
Dive into the details 🧵:📷
https://x.com/vulncure/status/1744002060016591097?s=20
🔥14👍3⚡2👏2❤1🕊1
PART - #2 🔐🛡
Understanding the Foundation: Jenkins Security Overview 🔐🛠
Before delving into exploitation, let's establish a solid understanding of key Jenkins security components:
Dive into the details 🧵:📷
https://x.com/vulncure/status/1744722597194186854?s=20
Understanding the Foundation: Jenkins Security Overview 🔐🛠
Before delving into exploitation, let's establish a solid understanding of key Jenkins security components:
Dive into the details 🧵:📷
https://x.com/vulncure/status/1744722597194186854?s=20
👍4❤2🔥2❤🔥1
PART - #3 🕵️♂️🛠
Let's Crack The Jenkins Instance 🔓
Now, let's take the plunge into Remote Code Execution (RCE) using Groovy scripts. This method is stealthier than creating a new project, so buckle up:
Dive into the details 🧵:📷
https://x.com/vulncure/status/1745514588001701991?s=20
Let's Crack The Jenkins Instance 🔓
Now, let's take the plunge into Remote Code Execution (RCE) using Groovy scripts. This method is stealthier than creating a new project, so buckle up:
Dive into the details 🧵:📷
https://x.com/vulncure/status/1745514588001701991?s=20
👍3❤1
PART - #4 ⚙️🔨
💨Mastering Jenkins RCE - Crafting and Modifying Projects 💼💻
Now, let's explore the art of Remote Code Execution (RCE) by creating and modifying projects in Jenkins.
🔑 Authority to tweak? Potent, if noisy! 🌪
Ready to amplify Jenkins skills? 🧵📷
https://x.com/vulncure/status/1746033898746736840?s=20
💨Mastering Jenkins RCE - Crafting and Modifying Projects 💼💻
Now, let's explore the art of Remote Code Execution (RCE) by creating and modifying projects in Jenkins.
🔑 Authority to tweak? Potent, if noisy! 🌪
Ready to amplify Jenkins skills? 🧵📷
https://x.com/vulncure/status/1746033898746736840?s=20
👍7❤2⚡2
🔥3😱2👀2❤1
API Testing Series #1 ✍️🪸
🔍 Key Highlights:
• 🫐 API Endpoints
• 🫑 Collection & Subcollection:
• 🥗 Gateway & 🥥Microservices Demystified
• 🥝 Web API Types
• ⚡️ CRUD Operations
• ❄️ 6 Constraints of Restful API
Let's Dive into the Details 👇⤵️
https://x.com/vulncure/status/1748018742158569966?s=20
🔍 Key Highlights:
• 🫐 API Endpoints
• 🫑 Collection & Subcollection:
• 🥗 Gateway & 🥥Microservices Demystified
• 🥝 Web API Types
• ⚡️ CRUD Operations
• ❄️ 6 Constraints of Restful API
Let's Dive into the Details 👇⤵️
https://x.com/vulncure/status/1748018742158569966?s=20
👍7🔥3
Bug Report as Document
Apache Tomcat :
• 🐞 BUG: HTTP Request Smuggling
• 📄 CVE ID: 2024-21733 | CWE: 444
Detailed Documentation : https://x.com/vulncure/status/1753271047355240874?s=20
Apache Tomcat :
• 🐞 BUG: HTTP Request Smuggling
• 📄 CVE ID: 2024-21733 | CWE: 444
Detailed Documentation : https://x.com/vulncure/status/1753271047355240874?s=20
🔥8👍5