hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Gaining Experiences and Building Connections: My Internship Journey at Appsecco
Medium
Gaining Experiences and Building Connections: My Internship Journey at Appsecco
Me and the Internship
hack and bug bounty
Finding Treasures in Github and Exploiting AWS for Fun and Profit — Part 2
Medium
Finding Treasures in Github and Exploiting AWS for Fun and Profit — Part 2
Disclaimer: This article is written for educational purposes, the author and Appsecco does not encourage readers to do engage in…
hack and bug bounty
Exploiting unusual Referer based XSS
hack and bug bounty
Cross Site Scripting for Fun: PasteJacking
hack and bug bounty
Exploiting JSON Cross Site Request Forgery (CSRF) using Flash
hack and bug bounty
Exploiting Misconfigured CORS via Wildcard Subdomains
hack and bug bounty
Turning Simple Login CSRF to Account Takeover
hack and bug bounty
Exploiting Misconfigured CORS (Cross Origin Resource Sharing)
hack and bug bounty
AirBnb Bug Bounty: Turning Self-XSS into Good-XSS #2
hack and bug bounty
Starting Bug Bounty ? | Bug Bounty Resources
hack and bug bounty
Uber | Exploiting Stored URL Redirect in Password Reset Token
hack and bug bounty
Hijacking tons of Instapage expired users Domains & Subdomains
hack and bug bounty
Privilege Escalation in a Django Application
Bug Bounty Findings by Meals
Privilege Escalation in a Django Application
Attached is the PDF of how I managed to escalate privileges to staff/superuser privileges via a misconfiguration. Django Privilege Escalation – Zero To Superuser
hack and bug bounty
Utilizing SSRF to Pivot Internal Networks
Bug Bounty Findings by Meals
Utilizing SSRF to Pivot Internal Networks
This is from a private bounty. The internal —-private.com domain was out of scope so I was asked to stop testing once I found the bug. SSRF To Pivot Internal Networks
hack and bug bounty
Exploiting Java Deserialization Via JBoss
Bug Bounty Findings by Meals
Exploiting Java Deserialization Via JBoss
Background First off, I would just like to reference the following sites/authors/tools for helping guide me along this route and providing a sweet tool to make this easy: I ran into a JMXInvokerSer…
hack and bug bounty
Getting Hustled by the Yahoo! Bug Bounty Program
Bug Bounty Findings by Meals
Getting Hustled by the Yahoo! Bug Bounty Program
Note: I was at one point the top bug reporter for Yahoo! If they do this to me. They are very likely to do this to you. Yahoo Remote Code Execution CMS Yahoo Response: Hey Sean, Our committee finis…
hack and bug bounty
XXE via SAML
Bug Bounty Findings by Meals
XXE via SAML
This was on a private bounty program. I have redacted all the info related to the program. Enjoy! Out of Band XML External Entity Injection via SAML – redacted
hack and bug bounty
Cisco Edge 340 Series v1.1 LFI as root
Bug Bounty Findings by Meals
Cisco Edge 340 Series v1.1 LFI as root
Originally I just had default administrator credentials then I poked around for less than 10 minutes and found a configuration export which allowed me to export files with root privileges. Attached…
hack and bug bounty
PhpThumb.php SSRF/LFI
Bug Bounty Findings by Meals
PhpThumb.php SSRF/LFI
I initially found this issue on a bounty, however it was marked out of scope on a third party provider. It may be possible to turn this into a RCE. Since I had no reason to escalate since no paymen…
hack and bug bounty
A hackers perspective on bug bounty triage
shubs
A hackers perspective on bug bounty triage
In the last few days, I have been able to have productive conversations with my peers in the bug bounty community including Patrik who works on the triage team and Luke who leads community efforts from HackerOne. Patrik has helped clear up misconceptions…