https://twitter.com/LooseSecurity/status/1215668507209236481?s=20
Still after all these years my favourite XSS payload is:
<iframe/src=j%0aa%0av%0aa%0as%0ac%0ar%0ai%0ap%0t:prompt `1`>
Still after all these years my favourite XSS payload is:
<iframe/src=j%0aa%0av%0aa%0as%0ac%0ar%0ai%0ap%0t:prompt `1`>
Twitter
m0z
Still after all these years my favourite XSS payload is: <iframe/src=j%0aa%0av%0aa%0as%0ac%0ar%0ai%0ap%0t:prompt `1`>
#CSRF
https://t.co/kXuunWpAf9
https://t.co/ZxGomelCEa
https://t.co/m0aHlSGcGs
https://t.co/F6ug84E5yA
https://t.co/uoB6Ie1IL8
https://t.co/2PLIzQsPIZ
https://t.co/OolLUkroDH
https://t.co/s9TJOP81Vw
https://t.co/srECoA2Av8
#bugbounty #bugbountytips
https://t.co/kXuunWpAf9
https://t.co/ZxGomelCEa
https://t.co/m0aHlSGcGs
https://t.co/F6ug84E5yA
https://t.co/uoB6Ie1IL8
https://t.co/2PLIzQsPIZ
https://t.co/OolLUkroDH
https://t.co/s9TJOP81Vw
https://t.co/srECoA2Av8
#bugbounty #bugbountytips
Medium
CSRF Token Bypasss — A Tale of my $2k bug
This is a short story of my first critical bug, a CSRF Token bypass which could lead to account take over.
XSS
https://t.co/XaYM1SsgZc
https://t.co/j9Db6HcXgF
https://t.co/T2WUECWyQX
https://t.co/yDikhVhodR
https://t.co/M01hjweuuJ
https://t.co/EiS9qdfz3u
https://t.co/EnIilLPjb7
https://t.co/tlB6IgUH4h
https://t.co/wF9FRMPojk
https://t.co/j3kAsLbSMt
#bugbounty #bugbountytips
https://t.co/XaYM1SsgZc
https://t.co/j9Db6HcXgF
https://t.co/T2WUECWyQX
https://t.co/yDikhVhodR
https://t.co/M01hjweuuJ
https://t.co/EiS9qdfz3u
https://t.co/EnIilLPjb7
https://t.co/tlB6IgUH4h
https://t.co/wF9FRMPojk
https://t.co/j3kAsLbSMt
#bugbounty #bugbountytips
footstep.ninja
cat ~/footstep.ninja/blog.txt
The HTML5 Herald
Authentication bypass
https://t.co/OIdGUOOH2k
https://t.co/99hgtbu1VF
https://t.co/gdwoqzKuWk
https://t.co/zZISYw8LWn
https://t.co/0taPKYA7bm
https://t.co/IWuP0H5qgC
https://t.co/mvf0GTQLT5
https://t.co/rLm72xTKd7
https://t.co/PxtfHsDKMZ
https://t.co/RQPOMH0wzH
#bugbounty #bugbountytips
https://t.co/OIdGUOOH2k
https://t.co/99hgtbu1VF
https://t.co/gdwoqzKuWk
https://t.co/zZISYw8LWn
https://t.co/0taPKYA7bm
https://t.co/IWuP0H5qgC
https://t.co/mvf0GTQLT5
https://t.co/rLm72xTKd7
https://t.co/PxtfHsDKMZ
https://t.co/RQPOMH0wzH
#bugbounty #bugbountytips
Medium
Bypass Mobile PIN Verification
There was a 4 digit PIN for opening the app. First I thought this can be bypass using response manipulation. But wait ! not getting any…