hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Disclose group members of a Facebook campus (https://www.facebook.com/campus/)
These aren't the access_tokens you're looking for
Disclose group members of a Facebook campus (https://www.facebook.com/campus/) - These aren't the access_tokens you're looking…
Facebook campus is a special group that needs an .edu styled email to gain access.It is possible to list members of a campus because the child groups list members. Timeline Jul 14, 2021 – Report sentJul 23, 2021 – Fixed by Facebook
hack and bug bounty
Finding Hidden Files and Folders on IIS using BigQuery
shubs
Finding Hidden Files and Folders on IIS using BigQuery
You can find this blog post on Assetnote's blog.
hack and bug bounty
Hacking on Bug Bounties for Four Years
shubs
Hacking on Bug Bounties for Four Years
You can find this blog post on Assetnote's blog.
hack and bug bounty
Expanding the Attack Surface: React Native Android Applications
shubs
Expanding the Attack Surface: React Native Android Applications
You can find this blog post on Assetnote's blog.
hack and bug bounty
Discovering a zero day and getting code execution on Mozilla's AWS Network
shubs
Discovering a zero day and getting code execution on Mozilla's AWS Network
You can find this blog post on Assetnote's blog.
hack and bug bounty
Gaining access to Uber's user data through AMPScript evaluation
shubs
Gaining access to Uber's user data through AMPScript evaluation
You can find this blog post on Assetnote's blog.
hack and bug bounty
High frequency security bug hunting: 120 days, 120 bugs
shubs
High frequency security bug hunting: 120 days, 120 bugs
1) Intro & Motivations
At the start of of this year, I set myself a personal goal of finding 365 bugs in 365 days.
This was entirely motivated by wanting to challenge myself to find more security issues as I felt I'd been slacking off.
I thought back to…
hack and bug bounty
Using ngrok to proxy internal servers in restrictive environments
shubs
Using ngrok to proxy internal servers in restrictive environments
When gaining shell access to a machine on a network, a promising attack vector is to check the internal network for web applications and services that may be accessible from the machine that has been compromised.
Often, internal web applications are found…
hack and bug bounty
Abusing URL Shortners to discover sensitive resources or assets
Shubham Shah
Abusing URL Shortners to discover sensitive resources or assets
As of late, a fair few companies and startups have been using dedicated URL shortner services to use for tracking and social media purposes. An example link from such URL shortners look like this invent.ge/1j1QxGo or invent.ge/DNATool. Note that both custom…
hack and bug bounty
Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
shubs
Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
As of late, I have been pentesting more and more applications that use some sort of mechanism to prevent unauthorized access to directories based on client IP addresses. In many cases, this has proven to be a weak method of protection if implemented incorrectly.…
hack and bug bounty
Security for young people in Australia
Shubham Shah
Security for young people in Australia
Security for young people is something I care about. We need to make an investment whether it be time, money or support or university outreach, to get younger people (preferrably students) to see security as a viable, exciting and worthwhile career. The real…
hack and bug bounty
Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)
shubs
Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)
Exploiting Markdown Syntax
Markdown is wonderful. In fact, this blog post itself is written in Markdown. I don't need to use lengthy uneccessary HTML for simple things like links, tables, code blocks and lists. Nor do I need to go out of my way to do simple…
hack and bug bounty
Enhancing the Detectify Crowdsource reward system with more continuous and lucrative payouts
Labs Detectify
Enhancing the Detectify Crowdsource reward system with more continuous and lucrative payouts
The reward for each time a submitted module is found in customers’ assets will be doubled for critical, high, and medium severity modules.
hack and bug bounty
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
www.assetnote.io
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
It's time for another round Citrix Patch Diffing! Earlier this month Citrix released a security bulletin which mentioned "unauthenticated buffer-related vulnerabilities" and two CVEs. These issues affected Citrix NetScaler ADC and NetScaler Gateway.
hack and bug bounty
RCE in Progress WS_FTP Ad Hoc via IIS HTTP Modules (CVE-2023-40044)
www.assetnote.io
RCE in Progress WS_FTP Ad Hoc via IIS HTTP Modules (CVE-2023-40044)
Over the last year or so, we've seen the mass exploitation of managed file transfer software. From GoAnywhere MFT, MOVEIt, and our own work on Citrix Sharefile. The threats towards enterprises through managed file transfer software has really hit home after…
hack and bug bounty
Secure Code Review #1: Basics (Getting Started)
Medium
Secure Code Review: Basics (Getting Started)
When it comes to software engineering, you may often hear the phrase “Trust the process,” but when it comes to security, it’s more…
hack and bug bounty
The Secrets Behind EC2 Takeovers
Medium
The Secrets Behind EC2 Takeovers
Have you heard of what a subdomain takeover is? Do you know the impact it has? Well, if you haven’t, I will shortly summarize it for you.
hack and bug bounty
What VPS to choose?
Medium
What VPS to choose?
There are tons of cloud providers that offer different types of servers with a lot of different options. I will talk about the ones I…
hack and bug bounty
SSRF to fetch AWS credentials with full access to various services
Medium
SSRF to fetch AWS credentials with full access to multiple services
This is a post about how I found a simple yet really critical vulnerability in a bug bounty program. It was the most critical bug I have…
hack and bug bounty
Bug Bounty — Beginner’s guide
Medium
Where to start?
There are lots of guides on how to start into Bug Bounty Hunting but I will share my personal experience of getting into bug bounty…