hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Getting Hustled by the Yahoo! Bug Bounty Program
Bug Bounty Findings by Meals
Getting Hustled by the Yahoo! Bug Bounty Program
Note: I was at one point the top bug reporter for Yahoo! If they do this to me. They are very likely to do this to you. Yahoo Remote Code Execution CMS Yahoo Response: Hey Sean, Our committee finis…
hack and bug bounty
XXE via SAML
Bug Bounty Findings by Meals
XXE via SAML
This was on a private bounty program. I have redacted all the info related to the program. Enjoy! Out of Band XML External Entity Injection via SAML – redacted
hack and bug bounty
Cisco Edge 340 Series v1.1 LFI as root
Bug Bounty Findings by Meals
Cisco Edge 340 Series v1.1 LFI as root
Originally I just had default administrator credentials then I poked around for less than 10 minutes and found a configuration export which allowed me to export files with root privileges. Attached…
hack and bug bounty
PhpThumb.php SSRF/LFI
Bug Bounty Findings by Meals
PhpThumb.php SSRF/LFI
I initially found this issue on a bounty, however it was marked out of scope on a third party provider. It may be possible to turn this into a RCE. Since I had no reason to escalate since no paymen…
hack and bug bounty
A hackers perspective on bug bounty triage
shubs
A hackers perspective on bug bounty triage
In the last few days, I have been able to have productive conversations with my peers in the bug bounty community including Patrik who works on the triage team and Luke who leads community efforts from HackerOne. Patrik has helped clear up misconceptions…
hack and bug bounty
A Glossary of Blind SSRF Chains
shubs
A Glossary of Blind SSRF Chains
You can find this blog post on Assetnote's blog.
hack and bug bounty
Finding Hidden Files and Folders on IIS using BigQuery
shubs
Finding Hidden Files and Folders on IIS using BigQuery
You can find this blog post on Assetnote's blog.
hack and bug bounty
Hacking on Bug Bounties for Four Years
shubs
Hacking on Bug Bounties for Four Years
You can find this blog post on Assetnote's blog.
hack and bug bounty
Expanding the Attack Surface: React Native Android Applications
shubs
Expanding the Attack Surface: React Native Android Applications
You can find this blog post on Assetnote's blog.
hack and bug bounty
Discovering a zero day and getting code execution on Mozilla's AWS Network
shubs
Discovering a zero day and getting code execution on Mozilla's AWS Network
You can find this blog post on Assetnote's blog.
hack and bug bounty
Gaining access to Uber's user data through AMPScript evaluation
shubs
Gaining access to Uber's user data through AMPScript evaluation
You can find this blog post on Assetnote's blog.
hack and bug bounty
High frequency security bug hunting: 120 days, 120 bugs
shubs
High frequency security bug hunting: 120 days, 120 bugs
1) Intro & Motivations
At the start of of this year, I set myself a personal goal of finding 365 bugs in 365 days.
This was entirely motivated by wanting to challenge myself to find more security issues as I felt I'd been slacking off.
I thought back to…
hack and bug bounty
Using ngrok to proxy internal servers in restrictive environments
shubs
Using ngrok to proxy internal servers in restrictive environments
When gaining shell access to a machine on a network, a promising attack vector is to check the internal network for web applications and services that may be accessible from the machine that has been compromised.
Often, internal web applications are found…
hack and bug bounty
Abusing URL Shortners to discover sensitive resources or assets
Shubham Shah
Abusing URL Shortners to discover sensitive resources or assets
As of late, a fair few companies and startups have been using dedicated URL shortner services to use for tracking and social media purposes. An example link from such URL shortners look like this invent.ge/1j1QxGo or invent.ge/DNATool. Note that both custom…
hack and bug bounty
Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
shubs
Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
As of late, I have been pentesting more and more applications that use some sort of mechanism to prevent unauthorized access to directories based on client IP addresses. In many cases, this has proven to be a weak method of protection if implemented incorrectly.…
hack and bug bounty
Security for young people in Australia
Shubham Shah
Security for young people in Australia
Security for young people is something I care about. We need to make an investment whether it be time, money or support or university outreach, to get younger people (preferrably students) to see security as a viable, exciting and worthwhile career. The real…
hack and bug bounty
Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)
shubs
Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)
Exploiting Markdown Syntax
Markdown is wonderful. In fact, this blog post itself is written in Markdown. I don't need to use lengthy uneccessary HTML for simple things like links, tables, code blocks and lists. Nor do I need to go out of my way to do simple…
hack and bug bounty
The Secrets Behind EC2 Takeovers
Medium
The Secrets Behind EC2 Takeovers
Have you heard of what a subdomain takeover is? Do you know the impact it has? Well, if you haven’t, I will shortly summarize it for you.
hack and bug bounty
What VPS to choose?
Medium
What VPS to choose?
There are tons of cloud providers that offer different types of servers with a lot of different options. I will talk about the ones I…
hack and bug bounty
SSRF to fetch AWS credentials with full access to various services
Medium
SSRF to fetch AWS credentials with full access to multiple services
This is a post about how I found a simple yet really critical vulnerability in a bug bounty program. It was the most critical bug I have…
hack and bug bounty
Bug Bounty — Beginner’s guide
Medium
Where to start?
There are lots of guides on how to start into Bug Bounty Hunting but I will share my personal experience of getting into bug bounty…