#WAF #ModSecurity #RCE #Payloads Detection #Bypass
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
  ;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
JSON Web Tokens vs. Session Cookies for Authentication
https://t.co/ok14MFmdvL
Remembering the Shellshock Vulnerability
https://t.co/xUGGhKSvP5
4 Uncommon Python Tricks You Should Learn
https://t.co/bOOvVe92Us
#bugbountytips
  https://t.co/ok14MFmdvL
Remembering the Shellshock Vulnerability
https://t.co/xUGGhKSvP5
4 Uncommon Python Tricks You Should Learn
https://t.co/bOOvVe92Us
#bugbountytips
Content Security Policy (CSP) Bypasses http://ghostlulz.com/content-security-policy-csp-bypasses/
  Everything you want to know about IOT Security ! Simplified https://medium.com/bugbountywriteup/everything-you-want-to-know-about-iot-security-simplified-7dca1b9e1c22
  
  Medium
  
  Everything you want to know about IOT Security ! Simplified
  The Internet of things is a network of devices that are connected to the Internet, controlled through it, and can exchange data with each…
  Account takeover via postMessage: https://yxw21.github.io/2020/06/05/Account-Takeover-Via-PostMessage/
  How to write a Bug Bounty report: http://10degres.net/how-to-write-a-bug-bounty-report/
  
  Gwendal Le Coguic
  
  How to write a Bug Bounty report
  One of the first thing I learned when I started security, is that the report is just as important as the pentest itself.
Some bug bounty platforms give reputation points according the quality.
While there is no official rules to write a good report, there…
  Some bug bounty platforms give reputation points according the quality.
While there is no official rules to write a good report, there…
“Penetration Testing Roadmap” by Knightsbr1dge https://link.medium.com/8ZZhEUqF86
  
  Medium
  
  Penetration Testing Roadmap
  Knightsbr1dge.red
  JSMon: Automated JavaScript File Monitoring
https://blog.r0b.re/hacking/pentesting/bugbounty/recon/web/js/2020/07/05/jsmon-automated-javascript-file-monitoring.html
  
  https://blog.r0b.re/hacking/pentesting/bugbounty/recon/web/js/2020/07/05/jsmon-automated-javascript-file-monitoring.html
r0bre’s blog
  
  JSMon: Automated JavaScript file monitoring
  JSMon: Automated JavaScript File Monitoring Today I’m proud to release JSMon, an online change monitoring tool for javascript files!
  Exploiting Imported Libraries to Bypass Cloudflare WAF
https://medium.com/bugbountywriteup/exploiting-imported-libraries-to-bypass-cloudflare-waf-7aed99186c5a
  
  https://medium.com/bugbountywriteup/exploiting-imported-libraries-to-bypass-cloudflare-waf-7aed99186c5a
Medium
  
  Exploiting Imported Libraries to Bypass WAF
  Turning a P5 Content Injection into P3 Reflected XSS
  https://upvir.al/ref/tH46562573/
Reserve your seat for an exciting event in Cybersecurity training this September.
All attendees will receive the benefits of
EC-Council Community Membership for Free.
  Reserve your seat for an exciting event in Cybersecurity training this September.
All attendees will receive the benefits of
EC-Council Community Membership for Free.
