Server Side Request Forgery via HTML injection in PDF download
https://blog.appsecco.com/server-side-request-forgery-via-html-injection-in-pdf-download-90ee4053e911
OTP Bypass on Indiaβs Biggest Video Sharing Site
https://link.medium.com/dkdKvYCSC5
Exploiting an SSRF: Trials and Tribulations by @abugzlife1
https://link.medium.com/eUqLk4Bzu5
#bugbounty #bubgountytips
https://blog.appsecco.com/server-side-request-forgery-via-html-injection-in-pdf-download-90ee4053e911
OTP Bypass on Indiaβs Biggest Video Sharing Site
https://link.medium.com/dkdKvYCSC5
Exploiting an SSRF: Trials and Tribulations by @abugzlife1
https://link.medium.com/eUqLk4Bzu5
#bugbounty #bubgountytips
Medium
Journey of a security bug β From a naive-looking PDF Download to SSRF via HTML Injection in AWS
A post about how I approached a novel security issue and now I feel I achieved an important milestone in my journey as a pentester.
Grep hostnames from ssl certificate
echo | openssl s_client -connect example\.com | openssl x509 -noout -text | grep DNS
#infosec #pentest #bugbounty
echo | openssl s_client -connect example\.com | openssl x509 -noout -text | grep DNS
#infosec #pentest #bugbounty
default credentials:
β’ http://securityoverride.org
β’ http://routerpasswords.com
β’ http://w3dt.net
β’ http://cirt.net
β’ http://default-password.info
β’ http://defaultpassword.us
β’ http://passwordsdatabase.com
β’ https://hashes.org
β’ http://open-sez.me
#OSINT
β’ http://securityoverride.org
β’ http://routerpasswords.com
β’ http://w3dt.net
β’ http://cirt.net
β’ http://default-password.info
β’ http://defaultpassword.us
β’ http://passwordsdatabase.com
β’ https://hashes.org
β’ http://open-sez.me
#OSINT