hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Abusing URL Shortners to discover sensitive resources or assets
Shubham Shah
Abusing URL Shortners to discover sensitive resources or assets
As of late, a fair few companies and startups have been using dedicated URL shortner services to use for tracking and social media purposes. An example link from such URL shortners look like this invent.ge/1j1QxGo or invent.ge/DNATool. Note that both custom…
hack and bug bounty
Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
shubs
Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions
As of late, I have been pentesting more and more applications that use some sort of mechanism to prevent unauthorized access to directories based on client IP addresses. In many cases, this has proven to be a weak method of protection if implemented incorrectly.…
hack and bug bounty
Security for young people in Australia
Shubham Shah
Security for young people in Australia
Security for young people is something I care about. We need to make an investment whether it be time, money or support or university outreach, to get younger people (preferrably students) to see security as a viable, exciting and worthwhile career. The real…
hack and bug bounty
Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)
shubs
Exploiting Markdown Syntax and Telescope Persistent XSS through Markdown (CVE-2014-5144)
Exploiting Markdown Syntax
Markdown is wonderful. In fact, this blog post itself is written in Markdown. I don't need to use lengthy uneccessary HTML for simple things like links, tables, code blocks and lists. Nor do I need to go out of my way to do simple…
hack and bug bounty
Enhancing the Detectify Crowdsource reward system with more continuous and lucrative payouts
Labs Detectify
Enhancing the Detectify Crowdsource reward system with more continuous and lucrative payouts
The reward for each time a submitted module is found in customers’ assets will be doubled for critical, high, and medium severity modules.
hack and bug bounty
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
www.assetnote.io
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
It's time for another round Citrix Patch Diffing! Earlier this month Citrix released a security bulletin which mentioned "unauthenticated buffer-related vulnerabilities" and two CVEs. These issues affected Citrix NetScaler ADC and NetScaler Gateway.
hack and bug bounty
RCE in Progress WS_FTP Ad Hoc via IIS HTTP Modules (CVE-2023-40044)
www.assetnote.io
RCE in Progress WS_FTP Ad Hoc via IIS HTTP Modules (CVE-2023-40044)
Over the last year or so, we've seen the mass exploitation of managed file transfer software. From GoAnywhere MFT, MOVEIt, and our own work on Citrix Sharefile. The threats towards enterprises through managed file transfer software has really hit home after…
hack and bug bounty
Secure Code Review #1: Basics (Getting Started)
Medium
Secure Code Review: Basics (Getting Started)
When it comes to software engineering, you may often hear the phrase “Trust the process,” but when it comes to security, it’s more…
hack and bug bounty
The Secrets Behind EC2 Takeovers
Medium
The Secrets Behind EC2 Takeovers
Have you heard of what a subdomain takeover is? Do you know the impact it has? Well, if you haven’t, I will shortly summarize it for you.
hack and bug bounty
What VPS to choose?
Medium
What VPS to choose?
There are tons of cloud providers that offer different types of servers with a lot of different options. I will talk about the ones I…
hack and bug bounty
SSRF to fetch AWS credentials with full access to various services
Medium
SSRF to fetch AWS credentials with full access to multiple services
This is a post about how I found a simple yet really critical vulnerability in a bug bounty program. It was the most critical bug I have…
hack and bug bounty
Bug Bounty — Beginner’s guide
Medium
Where to start?
There are lots of guides on how to start into Bug Bounty Hunting but I will share my personal experience of getting into bug bounty…
hack and bug bounty
IDOR in session cookie leading to Mass Account Takeover
Medium
IDOR in session cookie leading to Mass Account Takeover
If you are familiar with what IDOR is, you will know that it can be anywhere from url, request body, GET or POST requests and yes, in…
hack and bug bounty
Hacking Hackers for fun and profit
Medium
Hacking Hackers for fun and profit
This story will be in several parts. In each of the situations, I had to face unexpected results. By and large, these are stories that have…
hack and bug bounty
How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud
Medium
How I accidentally hacked many companies using N/A vulnerability in Atlassian Cloud
Below you will learn in detail about the discovered vulnerability that allowed me to get about 15000$ in bounty with all secrets from the…
hack and bug bounty
Credential stuffing in Bug bounty hunting
Medium
Credential stuffing in Bug bounty hunting
Bug hunting is not always about looking for classic vulnerabilities (XSS, SQLi, SSRF, RCE, etc). Sometimes it is a search for a new problem…
hack and bug bounty
$10,000 for a vulnerability that doesn’t exist
Medium
$10,000 for a vulnerability that doesn’t exist
A couple of months ago, an interesting story happened to me. I caught a Path Traversal issue with no chance to reproduce it again.
hack and bug bounty
From CRLF to Account Takeover
Medium
From CRLF to Account Takeover
At the beginning of March,while researching one site I discovered the new functionality. The functionality allowed the user to login via…
hack and bug bounty
Broke limited scope with a chain of bugs
Medium
Broke limited scope with a chain of bugs (tips for every rider CORS)
One morning, I was asked to participate in a private bug bounty program. In general, my experience in security is based on such private…
hack and bug bounty
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet
Medium
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet
Infiltrating Corporate Intranet like Banks, Governments, Airports became possible with vulnerable SSL VPN clients.