hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
High frequency security bug hunting: 120 days, 120 bugs
shubs
High frequency security bug hunting: 120 days, 120 bugs
1) Intro & Motivations
At the start of of this year, I set myself a personal goal of finding 365 bugs in 365 days.
This was entirely motivated by wanting to challenge myself to find more security issues as I felt I'd been slacking off.
I thought back to…
hack and bug bounty
Using ngrok to proxy internal servers in restrictive environments
shubs
Using ngrok to proxy internal servers in restrictive environments
When gaining shell access to a machine on a network, a promising attack vector is to check the internal network for web applications and services that may be accessible from the machine that has been compromised.
Often, internal web applications are found…
hack and bug bounty
Abusing URL Shortners to discover sensitive resources or assets
Shubham Shah
Abusing URL Shortners to discover sensitive resources or assets
As of late, a fair few companies and startups have been using dedicated URL shortner services to use for tracking and social media purposes. An example link from such URL shortners look like this invent.ge/1j1QxGo or invent.ge/DNATool. Note that both custom…
hack and bug bounty
Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
shubs
Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
As of late, I have been pentesting more and more applications that use some sort of mechanism to prevent unauthorized access to directories based on client IP addresses. In many cases, this has proven to be a weak method of protection if implemented incorrectly.…
hack and bug bounty
Security for young people in Australia
Shubham Shah
Security for young people in Australia
Security for young people is something I care about. We need to make an investment whether it be time, money or support or university outreach, to get younger people (preferrably students) to see security as a viable, exciting and worthwhile career. The real…
hack and bug bounty
Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)
shubs
Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)
Exploiting Markdown Syntax
Markdown is wonderful. In fact, this blog post itself is written in Markdown. I don't need to use lengthy uneccessary HTML for simple things like links, tables, code blocks and lists. Nor do I need to go out of my way to do simple…
hack and bug bounty
Enhancing the Detectify Crowdsource reward system with more continuous and lucrative payouts
Labs Detectify
Enhancing the Detectify Crowdsource reward system with more continuous and lucrative payouts
The reward for each time a submitted module is found in customers’ assets will be doubled for critical, high, and medium severity modules.
hack and bug bounty
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
www.assetnote.io
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
It's time for another round Citrix Patch Diffing! Earlier this month Citrix released a security bulletin which mentioned "unauthenticated buffer-related vulnerabilities" and two CVEs. These issues affected Citrix NetScaler ADC and NetScaler Gateway.
hack and bug bounty
RCE in Progress WS_FTP Ad Hoc via IIS HTTP Modules (CVE-2023-40044)
www.assetnote.io
RCE in Progress WS_FTP Ad Hoc via IIS HTTP Modules (CVE-2023-40044)
Over the last year or so, we've seen the mass exploitation of managed file transfer software. From GoAnywhere MFT, MOVEIt, and our own work on Citrix Sharefile. The threats towards enterprises through managed file transfer software has really hit home after…
hack and bug bounty
Secure Code Review #1: Basics (Getting Started)
Medium
Secure Code Review: Basics (Getting Started)
When it comes to software engineering, you may often hear the phrase “Trust the process,” but when it comes to security, it’s more…
hack and bug bounty
The Secrets Behind EC2 Takeovers
Medium
The Secrets Behind EC2 Takeovers
Have you heard of what a subdomain takeover is? Do you know the impact it has? Well, if you haven’t, I will shortly summarize it for you.
hack and bug bounty
What VPS to choose?
Medium
What VPS to choose?
There are tons of cloud providers that offer different types of servers with a lot of different options. I will talk about the ones I…
hack and bug bounty
SSRF to fetch AWS credentials with full access to various services
Medium
SSRF to fetch AWS credentials with full access to multiple services
This is a post about how I found a simple yet really critical vulnerability in a bug bounty program. It was the most critical bug I have…
hack and bug bounty
Bug Bounty — Beginner’s guide
Medium
Where to start?
There are lots of guides on how to start into Bug Bounty Hunting but I will share my personal experience of getting into bug bounty…
hack and bug bounty
IDOR in session cookie leading to Mass Account Takeover
Medium
IDOR in session cookie leading to Mass Account Takeover
If you are familiar with what IDOR is, you will know that it can be anywhere from url, request body, GET or POST requests and yes, in…
hack and bug bounty
Hacking Hackers for fun and profit
Medium
Hacking Hackers for fun and profit
This story will be in several parts. In each of the situations, I had to face unexpected results. By and large, these are stories that have…
hack and bug bounty
How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud
Medium
How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud
Below you will learn in detail about the discovered vulnerability that allowed me to get about 15000$ in bounty with all secrets from the…
hack and bug bounty
Credential stuffing in Bug bounty hunting
Medium
Credential stuffing in Bug bounty hunting
Bug hunting is not always about looking for classic vulnerabilities (XSS, SQLi, SSRF, RCE, etc). Sometimes it is a search for a new problem…
hack and bug bounty
$10,000 for a vulnerability that doesn’t exist
Medium
$10,000 for a vulnerability that doesn’t exist
A couple of months ago, an interesting story happened to me. I caught a Path Traversal issue with no chance to reproduce it again.
hack and bug bounty
From CRLF to Account Takeover
Medium
From CRLF to Account Takeover
At the beginning of March,while researching one site I discovered the new functionality. The functionality allowed the user to login via…