CyberSec Playground | Learn ethical hacking ⚡️
745 subscribers
73 photos
1 video
2 files
188 links
Welcome to CyberSec Playground! A community to learn, explore, and master penetration testing and bug bounty, ethical hacking, and all things cybersecurity.
Backup : https://t.me/fatherofbits
cybersecplayground.com
#BugBounty #Hacking
Download Telegram
🕵️‍♂️ MasterBin – New Credential Dump Site on the Dark Web 🧬
A new .onion service has appeared, known as MasterBin, which reportedly hosts fresh user:password credential leaks — including combos from various forums, breaches, and potentially stealer logs.

🚨 Caution: As of now, the site seems to be intermittently down, but may return soon. Always use proper OpSec and a trusted Tor connection when browsing such resources.

🧩 Details:
🔗 MasterBin Onion URL

http://rfetmd5tcg2frv5tx6v3sdbuhkfhafad67d5gutzghmgzpmwpjeihlqd.onion

🧵 Related Dread Discussion
http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/34da084e7a87287a2490

Threads mention it may aggregate credentials from multiple sources into a search-friendly interface — similar to older services like Snusbase or Citadel leaks.

⚠️ Reminder:


1️⃣ Do not access such sites without a VPN + Tor
2️⃣ Never reuse credentials
3️⃣ Use this info ethically (e.g., for threat research, monitoring leaked data, or red team simulations)

🧠 Follow @cybersecplayground for dark web intel, breach alerts, and advanced cybersecurity tactics.

💬 Like & share to support the channel.

#DarkWeb #Leaks #CredentialDump #OpSec #CyberSecurity #BugBounty #CTI #cybersecplayground
🔥53
🔍 WordPress Vulnerability Scanner: wpprobe 🚀
Looking for a clean, fast, and modular WordPress reconnaissance tool? wpprobe is a lightweight scanner for enumerating vulnerable plugins, themes, and WP versions.


🧰 Features:
Enumerates:
🔸 WordPress versions
🔸 Vulnerable themes
🔸 Plugins (with known CVEs)

Fast and Simple:
🔸 Scans hundreds of WordPress sites from a single input list
🔸 Uses fingerprints.json for version and vuln detection
🔸 Focuses on known CVEs and weak plugin/theme setups

Customizable:
🔸 Easily extend with your own fingerprint DB
🔸 Can integrate into bug bounty recon pipelines

🛠 Installation:
git clone https://github.com/Chocapikk/wpprobe.git
cd wpprobe
go build .
./wpprobe -list targets.txt

➡️ targets.txt should contain URLs of suspected WordPress sites.

🔍 Output:
It shows:
🔸 Detected plugin versions
🔸 Associated CVEs (if any)
🔸 Misconfigurations and exposures

📁 Results are printed to stdout and can be redirected to files for mass analysis.

🧠 Tip:
Combine with tools like:
🔸 subfinder or amass for domain enumeration
🔸 httpx to find live WordPress installs
🔸 Then feed results into wpprobe to quickly identify low-hanging WordPress vulnerabilities.

📢 Join @cybersecplayground for daily bug bounty tools, recon tactics, and advanced hacking tips!
❤️ Like & Share if you love clean recon tools!

#BugBounty #WordPress #Recon #VulnerabilityScanner #InfoSec #wpprobe #GoLang #CyberSecurity #CTF #cybersecplayground
12
🧠 Bug Bounty Dorks to Discover Reward Programs

Want to uncover hidden responsible disclosure or bug bounty programs?

Use these Google Dorks to find gold:

site:*.*.nl intext:"responsible disclosure reward"
"security vulnerability" "report"
inurl:"security report"
site:.eu "responsible disclosure"
"responsible disclosure" university
inurl:/responsible-disclosure/ university

💡 Pro Tip: These dorks help locate universities, EU orgs, and private entities offering rewards or recognition for vulnerabilities — often overlooked by most hunters.

Happy hunting! 🎯

📲 Follow @cybersecplayground for more recon tips, dorks, and daily bug bounty hacks.
🔁 Like & Share with your hunting crew!

#bugbountytip #infosec #recon #dorks #bugbounty #securityresearch
🔥53
🔍 [IDOR Leads to Sensitive Info Exposure]

Two unauthenticated GET requests leaking other users' private data:

GET /v2/user/profile?clubname=123
GET /v1.0/user/profile?clubname=321

💥 Leaked Data Includes:

🔸 Club Owner’s Email Address 📧
🔸 Phone Number 📱
🔸 Current Balance 💰

🧠 What’s happening?
This is a classic Insecure Direct Object Reference (IDOR) — the backend doesn’t verify if the requesting user is authorized to view the specified clubname.

Fix Recommendation:
Always verify object ownership before responding with sensitive data. Implement proper access control on API endpoints.

📲 For more real-world bugs and exploitation insights, follow @cybersecplayground

🔁 Like & Share if you’ve seen similar bugs!

#bugbounty #infosec #IDOR #cybersecurity #api #vulnerability #recon
5🔥4
🔍 Triple Fuzzing Technique for Hidden Paths

Let’s say you discover this URL during recon:
👉 https://test[.]com:8443/phpmyadmin

Don't stop there — Triple Fuzz it! 🧠

🔥 Try Fuzzing These Paths:
1️⃣ https://test[.]com/FUZZ
2️⃣ https://test[.]com:8443/FUZZ
3️⃣ https://test[.]com:8443/phpmyadmin/FUZZ

Why? Because:


Different ports = different services
Nested directories often hide backups or admin panels
Misconfigured virtual paths may expose sensitive endpoints

————

📌 Use tools like:

- ffuf
- dirsearch
- feroxbuster

🔁 Combine this with smart wordlists for 🔐 high-value paths.

————

💡 Small tweaks = BIG wins in bug bounty.
📲 Follow @cybersecplayground for more daily hacking tips!
💬 Got more recon tricks? Share them below!

#bugbounty #fuzzing #recon #websecurity #ctf #infosec
9💊2
🚨 CVE-2024-24919: Check Point Remote Access VPN Vulnerability

A critical flaw has been identified in Check Point's Remote Access VPN — potentially allowing attackers to steal credentials or bypass security mechanisms.


—————

🔍 Quick Summary:
💥 Vulnerability: Unauthenticated Info Disclosure
🧠 CVSS Score: 8.6 (High)
📅 Year: 2024
📌 Affects: SSL Network Extender (VPN)
📂 Advisory: NVD Details

—————

🛠 Recon Dorks to Find Targets:

👉 FOFA Query 1:
app="Check_Point-SSL-Network-Extender"


👉 FOFA Query 2:
title="Check Point SSL Network Extender"


🌍 Results: 45,343 exposed instances
🔎 FOFA Direct Link: Search Now

—————

🧪 PoC & Technical Breakdown:
📚 Blog: WatchTowr Labs
💻 Includes a working proof of concept for exploitation.

—————

🛡 Mitigation Tip:
✔️ Apply latest patches from Check Point ASAP
✔️ Monitor VPN access logs for anomalies

—————

📲 Stay ahead in the bug bounty game!
Join @cybersecplayground for daily CVE alerts, recon tricks, and PoCs.

🔁 Like, Share & Educate
#bugbounty #CVE2024_24919 #checkpoint #vpn #infosec #cybersecurity #zeroday #cybersecplayground
🔥52
🔍 Tool Spotlight: WhatWeb – Website Fingerprinting Like a Pro

Want to know what’s running behind a website without touching the source code?
Meet WhatWeb — your go-to recon tool for fingerprinting technologies used on websites 🔧🌐

Read full Post At Github (Dont forget to give star and follow us on github) :

🔗 Link : https://github.com/cybersecplayground...

#bugbounty #CVE2024_24919 #checkpoint #vpn #infosec #cybersecurity #zeroday #cybersecplayground
5
💥 SSTI in Go Templates = Stored XSS?

If you come across SSTI (Server-Side Template Injection) in a Go (Golang) application, don’t stop at just proving injection — go for impact!



Try this payload to bypass HTML sanitization and achieve XSS :
{{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}}


🔍 This works because:

💎 Go templates treat {{define}} and {{template}} as dynamic blocks.
⚡️ You can inject arbitrary template logic including script tags.
🔸 Useful in misconfigured custom template rendering engines.

💡 Why it matters:
Stored XSS via SSTI can lead to session hijacking, data exfiltration, or even account takeover.

📢 Stay ahead in bug bounty & infosec — follow @cybersecplayground for daily tips, tools, and CVE insights.

💬 Found a new payload? Drop it in the comments!
👍 Like & 🔁 Share if this helped!

#bugbountytips #ssti #xss #golang #infosec #cybersec #cybersecplayground
🔥6💊2
🚨 CVE-2025-32756: Fortinet RCE via Stack-Based Buffer Overflow
A critical unauthenticated remote code execution vulnerability was discovered in multiple Fortinet products — caused by a stack-based buffer overflow in the AuthHash cookie parsing logic. Exploiting this allows full remote code execution without authentication.


🔍 Key Details:
📌 Type: Stack-based Buffer Overflow
💥 Impact: Unauthenticated RCE
🧠 Attack Vector: Malicious AuthHash cookie
📆 Year: 2025
🛠 Status: Public PoC available

🧪 Affected Products:
• FortiVoice
• FortiMail
• FortiNDR
• FortiRecorder
• FortiCamera

🧬 PoC GitHub Repo:
🔗 CVE-2025-32756-POC by kn0x0x

🛡 Mitigation Steps:
Apply patches released by Fortinet ASAP
Disable unnecessary web interfaces
Monitor for abnormal traffic targeting Fortinet login panels

📲 For more CVEs, PoCs, and recon tips — follow @cybersecplayground
Get smarter every day in cybersecurity.

🔁 Like & Share to spread awareness
#bugbounty #fortinet #rce #CVE2025_32756 #cybersecurity #infosec #zeroday #cybersecplayground
💊54🗿1
🚨 New WAF Bypass for Akamai & Cloudflare
🛡 XSS Payload via onscrollsnapchange + Obfuscation

Researchers found a new way to bypass some WAF rules using the obscure event onscrollsnapchange in combination with obfuscated eval logic.


💥 Payload:
<address onscrollsnapchange=window['ev'+'a'+(['l','b','c'][0])]
(window['a'+'to'+(['b','c','d'][0])]('YWxlcnQob3JpZ2luKQ=='));
style=overflow-y:hidden;scroll-snap-type:x>
<div style=scroll-snap-align:center>1337</div></address>


🔍 How it works:
🔸onscrollsnapchange is rarely filtered and gets overlooked by many WAFs.
🔸 eval is split and reconstructed dynamically: ['l','b','c'][0] = 'l'.
🔸 Base64 payload decoded to: alert(origin).
🔸 Built-in scroll and display tricks help it render without suspicion.

Bypasses tested on:

Cloudflare (standard settings)
Akamai WAF profiles

💡 Tip: Always explore lesser-known event attributes + JS obfuscation when testing for XSS/WAF bypasses.

🔔 Follow @cybersecplayground for more cutting-edge bypasses, CVE drops, and recon techniques.

🔗 Other XSS payload list at cybersecplayground github
#xss #wafbypass #akamai #cloudflare #bugbountytips #cybersec #infosec #cybersecplayground
3🌭2💊1
💡 Bug Bounty Pro Tip: Uncover Hidden Subdomains via /cdn-cgi/trace 🔍

Want to find internal IPs or misconfigured edge services on live domains?

Try this:
➡️ Visit:

https://target.com/cdn-cgi/trace


It often reveals:
🔸 Internal IP (ip=)
🔸 Datacenter info
🔸 Trace metadata

🔁 From IP to Hidden Subdomains:

🎯 Get ASN range of the internal IP (using asnmap or amass intel)

🚀 Scan with naabu to find active hosts

🔎 Enumerate reverse DNS via dnsx to spot hidden subdomains!

💥 Sometimes you’ll catch staging, dev, or admin panels that don’t even show up in public recon.

🔐 Your move:
What’s YOUR secret trick for hidden subdomain hunting?
👇 Drop it below and share the love 👇

📡 Follow @cybersecplayground for daily recon tactics, advanced bug bounty tricks, and offensive security content.

#bugbounty #recon #infosec #subdomain #OSINT #CTF #cybersecplayground
7💊4
🚨 ALERT: CVE-2024-3721
Under Active Exploitation

A new variant of the Mirai malware botnet is exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 digital video recording devices to hijack them.

The flaw, tracked under CVE-2024-3721, is a command injection vulnerability disclosed by security researcher "netsecfish" in April 2024. 🧠📟

🎯 Vulnerability: CVE-2024-3721
💥 Impact: Remote Code Execution → Botnet Infection
🔎 Targeted Devices: TBK DVR systems
📊 Over 97,000+ exposed services are indexed on Hunter

🧪 Recon Queries:

🔍 Hunter:
protocol.banner="Location:/login.rsp"


🔍 FOFA:
banner="Location:/login.rsp"


📚 In-Depth Analysis:
Kaspersky SecureList
BleepingComputer Report
SecurityOnline News

🧵 Hunter Direct Search:
🔗 Search Results (97K+)

💻 Stay ahead in vuln intelligence & recon: Join @cybersecplayground
🔁 Like & Share to spread awareness!

#CVE2024_3721 #Mirai #botnet #hunterhow #fofa #vulnerability #infosec #osint #cybersecplayground
7
🔍 Automating CORS Vulnerabilities with Corsy 🔥

CORS misconfigurations can expose sensitive data—and Corsy makes it EASY to automate the hunt! 😎

🧪 Steps to Automate:

🔍 Discover subdomains using tools like Amass or Subfinder

⚙️ Run the list with Corsy:

python3 corsy.py -i ./targets.txt

👀 Review endpoints leaking sensitive data (especially authenticated ones)

📄 Craft PoCs and escalate your findings

🛠 Corsy Features:
Lightweight Python3 tool
Scans all known CORS misconfigurations
Supports threading, delay, JSON output
Bypass detection: wildcard, null origin, pre/post domain, etc.

📦 Install:
git clone https://github.com/s0md3v/Corsy
cd Corsy && pip3 install requests


🚀 Example Usage:

python3 corsy.py -u https://example.com -t 20 --headers "User-Agent: GoogleBot\nCookie: SESSION=Hacked"

🔗 GitHub: Corsy by @s0md3v

🔐 Pro tip: Look for CORS on subdomains + login APIs leaking JSON user profiles 👀

📡 Stay sharp and hunt smart — automation = more bugs, faster 💸

Follow for more at 👉 @cybersecplayground
Like + Share if this saved you hours!
#bugbounty #cors #infosec #automation #cybersec #recon
4🔥4💊1
🚫 Stuck on a 403 Forbidden?
Don't give up yet — here are 7 powerful tricks to bypass it like a pro 💥

🔍 403 Bypass Techniques:

1️⃣ X-Forwarded-For: 127.0.0.1
2️⃣ X-Original-URL: /admin
3️⃣ Referer: https://target.com/
4️⃣ HTTP Method Manipulation: POST, HEAD, OPTIONS, DELETE
5️⃣ Case Sensitivity: /admin, /aDmIn, /Admin/
6️⃣ Encoding: URL encode parts (%2e, %2f, %20, etc.)
7️⃣ Path Normalization:
  • /../admin
  • //admin
  • /./admin

🧠 Bonus Tip: Always combine methods — e.g., custom headers + encoding = 🔓

💻 Daily hacks, PoCs, and recon tools — only at @cybersecplayground
👍 Like & Share if this saved your time!

#bugbounty #infosec #403bypass #cybersec #pentesting #websecurity #cybersecplayground
🔥81
🧠 Host Header Injection → Password Reset Poisoning

A simple yet powerful chain that leads to account takeover! 🔓

🚨 Attack Flow:
1️⃣ Web app builds the password reset link based on the Host header
2️⃣ Attacker crafts request:

POST /reset HTTP/1.1  
Host: attacker[.]com

...
3️⃣ App includes attacker domain in reset link
4️⃣ Victim clicks reset → Token goes to attacker[.]com
5️⃣ 🎯 Attacker captures token → Resets password → Account takeover 💀

💡 Mitigation:
Always validate Host header against a whitelist
Use absolute URLs server-side, not header-based
Consider X-Forwarded-Host + proxy settings

🔎 Tip: Use Burp or curl to manipulate headers and test for vulnerable reset flows!

📲 Follow @cybersecplayground for more attack techniques, PoCs, and bypass tips
👍 Like + 🔁 Share if you learned something new!
#bugbounty #websecurity #hostheader #infosec #cybersec #recon
5👍3
🚨 Next.js + WAF Bypass + SXSS via Cookie Reordering 🚨

🧠 Attack Summary:
You’re dealing with:

🔍 A Next.js app

⚠️ Two reflected cookies in pageProps
⚠️ A WAF blocking your initial attempts

🧪 Observations:
🧨 Single payload → 403 Forbidden

🧨 Split payload across two cookies → Still 403

🧨 Reorder the cookie fragments → 200 OK

👀 That’s your in! Reversing the order bypasses the WAF inspection logic 🔄

⚠️ Now chain it with:

🧫 CVE-2024-46982 (Elixir Stale SSR template injection)
🔗 https://github.com/masch1/CVE-2024-46982

➡️ This allows CP (Client-side Prototype Pollution) → Stored XSS (SXSS) in Next.js apps.

💣 Exploit Flow:
💎 Bypass WAF via cookie reordering
💎 Inject CP payload using stale Elixir template vuln
💎 Achieve SXSS across all visiting users!

🛡 Mitigation Tips:
Sanitize cookie inputs server-side
Audit template engines for unsafe parsing
Patch Elixir if in stack (see CVE-2024-46982)

🔍 Keep hunting clever chains like this. WAFs aren’t invincible!
📢 Follow @cybersecplayground for more wild bug chains, PoCs, and bypass tricks
👍 Like & 🔁 Share to help others learn!

#bugbounty #nextjs #xss #sxss #wafbypass #infosec #cybersecurity #cve2024_46982
🔥8
🚨 Bug Bounty Trick: Bypass Invalid ID Validation via Array Injection 🧠

Sometimes a small change makes a big difference!

🔍 Original Request:
DELETE /api/bookings?bookings=3777104

Response: 400 Bad Request — "Invalid Bookings"

Modified Request:
DELETE /api/bookings?bookings[]=3777104

💥 Response: 200 OK — Booking successfully deleted!

📌 Why This Works:
Some backends treat bookings= as a scalar (single ID), while bookings[]= is interpreted as an array of IDs.

If the API logic expects an array, this simple tweak can bypass input validation or authorization checks, potentially leading to:

🛑 IDOR (Insecure Direct Object Reference)
🗑 Unauthorized Deletion of Bookings
📬 Mass Resource Tampering (loop over IDs)

🔧 Tip: Always test both forms:
param=value
param[]=value

…and watch how the backend responds differently 🔎

📢 Stay sharp, test weird inputs, and keep hacking smart.
Follow @cybersecplayground for more tips like this.
👍 Like & 🔁 Share to help the community grow!

#bugbounty #api #idor #infosec #cybersec #websecurity #bypass #cybersecplayground
6👍4
🕵️‍♂️ Laravel Debug Leak via Negative ID Trick
🔍 Framework: PHP Laravel

If you come across a Laravel-based endpoint like:


GET /api/users/?userid=1234

👉 Try This:

GET /api/users/?userid=-1

💥 Why it works:
Passing a negative userid can trigger unhandled conditions or unexpected model lookups. In Laravel, this might expose:

🐞 Debug info
🔐 API keys or .env configs
🔁 Internal routes & proxies
📜 Stack traces and SQL queries

🧠 Pro Tip: Use this as a gadget — it's especially useful in chained attacks (e.g., IDOR + Debug Info = Pwnage).

📢 Follow @cybersecplayground for daily 🔍 recon tricks, bug bounty tips, and real PoCs.

#bugbountytips #laravel #debug #infosec #cybersec #websecurity #cybersecplayground
5🔥5
🌍 Find All Public VDPs with a Simple Dork 💥
Hunt responsible disclosure programs worldwide in seconds

🕵️ Dork for Shodan/ZoomEye:
(body="/responsible-disclosure"  body="/.well-known/security.txt") && port="443"


🔎 This will reveal sites with:

A Responsible Disclosure page Or a security.txt file (per RFC 9116)

💡 What You Get:
List of companies actively accepting vulnerability reports
Perfect targets for legal bug bounty hunting
Entry points into private bounty programs
Contact emails for reporting bugs (security@example.com)

🧠 Why This Works:
🔸 /.well-known/security.txt is a standardized VDP endpoint
🔸 /responsible-disclosure is commonly used by companies not following RFC
🔸 Both indicate the company welcomes security testing (within scope)

🛠 Pro Tip:
Use these tools for discovery:
`
⚡️ ZoomEye
zoomeye search '(body="/responsible-disclosure" body="/.well-known/security.txt") && port="443"'

⚡️ Shodan CLI
shodan search '(http.html:"/responsible-disclosure" OR http.html:"/.well-known/security.txt") port:443'

Then scan those domains with your favorite recon & fuzzing tools 👇
🔥 They’re often low-hanging fruit with weak auth, forgotten endpoints, and juicy info.

📢 Reminder:
Always read the VDP scope before testing. No scope = no hacking.

🔔 Follow @cybersecplayground for daily recon tips and bug bounty gems
❤️ Like, 🔁 Share, and Tag your hacker friends!

#BugBounty #VDP #SecurityTXT #Recon #InfoSec #EthicalHacking #CTF #cybersecplayground #HackingTips
5👍1
🧠 Path Traversal in ZIP Uploads
A classic vulnerability that still pops up in the wild — let’s break it down:

📂 The Scenario:

1️⃣ The application accepts ZIP file uploads from users.
2️⃣ It extracts ZIP contents server-side without path sanitization.
3️⃣ The ZIP contains malicious paths like:

../../../../etc/passwd


4️⃣ No checks? Then boom 💥 — the files get extracted outside the intended directory.


🎯 Impact:
• Arbitrary file write on the server
• Potential to overwrite configs, upload web shells, or tamper with logs
• Leads to RCE, LFI, or privilege escalation depending on the context


🔐 How to Prevent:

Normalize & sanitize extraction paths
Use extraction libraries that block traversal (e.g., Python’s zipfile with validation)
Restrict ZIP extraction to a sandboxed directory only

📦 Payload Sample:

evil.zip
└── ../../../../var/www/html/shell.php


💻 Learning real exploitation techniques like this?
Stay sharp with daily tips at 👉 @cybersecplayground

#PathTraversal #ZipSlip #BugBounty #CyberSecurity #EthicalHacking #PentestTips #InfoSec #WebSecurity #Payloads #RCE #HackerTricks #ZipUpload #SecurityAwareness #CybersecPlayground
7👍1
🔓 Account Takeover via Email Injection Tricks

Sometimes, you don’t need a vulnerability — just a weak parser. Here’s a sneaky way to hijack accounts by injecting multiple emails in signup/login flows where email validation is broken. 🚨

🎯 The Idea:

The app checks only the first email, but sends confirmation/reset links to all of them.
If you sneak your email in, you get the link too.

🔍 Common Bypass Payloads (Separators):

email=victim@mail.com,hacker@mail.com
email=victim@mail.com%20hacker@mail.com
email=victim@mail.com|hacker@mail.com


📦 Array-Based Payload:

{
"email": ["victim@mail.com", "hacker@mail.com"]
}


If the server sends an email to both, you win 🏆

🧠 Why This Works:

Some backend libraries (especially in PHP or Node.js) parse input loosely, accepting multiple values — and sometimes broadcasting emails to all listed addresses. 😱


Always test registration, password reset, and invite systems
Monitor HTTP requests & responses
Use Burp, Param Miner, and manual tampering


💻 Stay ahead of the game — learn real ATO techniques & bug bounty tricks
Join us: 👉 @cybersecplayground


#AccountTakeover #BugBountyTips #EmailInjection #InfoSec #CyberSecurity #EthicalHacking #ATO #WebSecurity #Recon #HackingTricks #BugBounty #CybersecPlayground #infosec #bugbountytips #cybersec
8🔥1