“Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty” by Omkar Bhagwat (th3_hidd3n_mist) https://link.medium.com/KABwitzpQ2
Medium
Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty
Hey everyone, I recently reported a dupe for a XSSI bug on a private program which paid out $300, to the original reporter. I believe the…
https://wildfire.blazeinfosec.com/leveraging-web-application-vulnerabilities-to-steal-ntlm-hashes-2/
Blaze Information Security - Wildfire Labs
Leveraging web application vulnerabilities to steal NTLM hashes
Introduction NTLM authentication is the de-facto standard in corporate networks running Windows. There are a plethora of well-understood local attacks that take advantage of the way Windows perform automatic NTLM authentication, and abusing this feature is…
How to Takover a ldap server.
https://medium.com/@D0rkerDevil/how-i-tookover-a-ldap-server-703209161001
How PayPal helped me to generate XSS
https://medium.com/@pflash0x0punk/how-paypal-helped-me-to-generate-xss-9408c0931add
How I earned $$$$ by finding confidential customer data including plain-text passwords
https://medium.com/@saurabh5392/how-i-earned-by-finding-confidential-customer-data-including-plain-text-passwords-f93c4ce2631
#bugbounty,#bugbountytips
https://medium.com/@D0rkerDevil/how-i-tookover-a-ldap-server-703209161001
How PayPal helped me to generate XSS
https://medium.com/@pflash0x0punk/how-paypal-helped-me-to-generate-xss-9408c0931add
How I earned $$$$ by finding confidential customer data including plain-text passwords
https://medium.com/@saurabh5392/how-i-earned-by-finding-confidential-customer-data-including-plain-text-passwords-f93c4ce2631
#bugbounty,#bugbountytips
Medium
How I Tookover a ldap server.
Intro
https://github.com/s1kr10s/D-Link-DIR-859-RCE/
https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104
https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104
GitHub
GitHub - s1kr10s/D-Link-DIR-859-RCE: D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)
D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621) - s1kr10s/D-Link-DIR-859-RCE
#Powershell script to extract all users and last logon timestamp from a domain
https://gallery.technet.microsoft.com/scriptcenter/Powershell-script-to-398c5aab
https://gallery.technet.microsoft.com/scriptcenter/Powershell-script-to-398c5aab