CyberSec Playground | Learn ethical hacking ⚡️
745 subscribers
73 photos
1 video
2 files
188 links
Welcome to CyberSec Playground! A community to learn, explore, and master penetration testing and bug bounty, ethical hacking, and all things cybersecurity.
Backup : https://t.me/fatherofbits
cybersecplayground.com
#BugBounty #Hacking
Download Telegram
⚡️ Welcome to CyberSecPlayground! ⚡️

Your go-to hub for all things cybersecurity. Whether you're a beginner, enthusiast, or professional, this channel is dedicated to exploring:
- Cybersecurity tips and tricks
- Latest news and updates
- Tutorials and guides
- Tools and resources for ethical hacking and defense

🔐 Stay informed, stay secure!
💬 Feel free to share your thoughts, questions, and ideas. Let's build a strong and safe digital community together.

🟡 Dont Forget to BOOST channel

Follow us for regular updates: @cybersecplayground

🔗 Other CSP medias:
Github
Medium
Youtube
WebSite

1️⃣ CyberSecPlayground Forever
6🔥5💊3
GoSearch - OSINT tool for searching people's digital footprint and leaked passwords across various social networks, written in Go.

https://github.com/ibnaleem/gosearch

#bug_bounty #bugbounty #cybersecurity
🔥1
LFI Vulnerability Testing: Key Parameters

?dir={payload}
?action={payload}
?date={payload}
?detail={payload}
?file={payload}
?download={payload}
?path={payload}
?folder={payload}
?include={payload}
?page={payload}
?locate={payload}
?site={payload}

#infosec #cybersec
❤‍🔥4
CVE-2024-12912&CVE-2024-13062
:Injection and execution vulnerabilities in certain ASUS router firmware series.
📊 1.2m+ Services are found on hunter.how yearly.
🔗Hunter Link: hunter.how/list?searchVal
👇Query
HUNTER :/product.name="ASUS AiCloud"
FOFA : product="ASUS-AiCloud"
SHODAN : product:"ASUS AiCloud"
📰Refer:securityonline.info/cve-2024-12912
asus.com/content/asus-p
#ASUS #hunterhow #infosec #infosecurity #OSINT #Vulnerability
🔥1
403 bypass methodology !

1- using space symbols
exmaple:
/admin -> 403
/admin%09 -> 200
/admin%20 -> 200

2- use traversal
Example:
/admin -> 403
/..;/admin -> 200

you can fuzz with traversal sometimes that's end with results

Example: /..;/FUZZ

#bugbountytips
❤‍🔥3🔥3
CVE-2024-53704

Zero-day vulnerability in Sonicwall: An authentication bypass in SonicOS SSLVPN

📊 15.9K+ Services are found on hunter.how yearly.

🔗 Hunter Link: hunter.how/list?searchVal
👇Query

HUNTER :product.name="SonicOS

FOFA : product="SonicOS"

📰 Refer:securityonline.info/sonicwall-issu


#SONICWALL #hunterhow #infosec #infosecurity #OSINT #Vulnerability
3
LFI Payload
(Add to your custom list)

filePath=../../../../../../../../../../../../../../windows/system32/drivers/etc/hosts

#bugbountytips
Cors bypass:
Xdomain.com --> not allowed
XXdomain.com --> not allowed
XXXdomain.com --> not allowed
....
XXXXXXXdomain.com --> allowed!

a certain number of characters appended to the whitelisted domain name would bypass the CORS.
#cors #bypass #bugbountytips
👌2❤‍🔥1
Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulation techniques. It also includes fuzzing for HTTP methods and protocol versions, making it a versatile addition to any web security researcher's toolkit.

Link : https://github.com/nazmul-ethi/Bypass-Four03

#bypass #bugbountytip #bugbountytips #bugbounty
❤‍🔥2