Today i found something interesting
A Server Side Javascript Code Injection
Looks LIT🔥🔥.
Server delayed the response for 30 sec...you change the values the delay changes.
#BugBounty
#bugbountytips
If you ever find a jfrog panel ... Always check /ui path or the shown path below...it might reveal lot's of artifacts containing critical data✌️.
The severity will be high 👀
The JSON email tempering method still works.
Tried something like this 👇
my email- attacker
@gmail
.com
Victim email -victim
@gmail
.com
On signup page gave
victim
@gmail
.com&attacker
@gmail
.com
The OTP came to victim
@gmail
.com& attacker
@gmail
.com but in attacker
@gmail
.com account.
I just published Pawning Half A dozen of Admin Panels & User Management Apps And Reporting 9–10 P1 in a day.
Here is how I reported around 8-10 P1 in a single day
#bugbounty
#bugbountytips
Recently found an account takeover in Facebook
Okay so listen carefully
1. Type the email id of the victim
2. Click on forget password
3. Invite the victim at your home for some tea/coffee
4. Beat the shit out of the victim until you don't get their phone.
5. Reset the password.
My gf is unbeatable 😂😂❤️
she is literally soooo far awayyyy from cyber security ... doesn't even know the C of "Cyber Security" yet sent me this....because all she knows is that i am in this field.this is the best resource i have received till date😂😂❤️😎
Inspired By a few people.
I did a little good in the past few days,
Dropped 9-10 P1 and all got accepted except 1.
Thanks to everyone who is an inspiration for me
Specially my buddies
@ADITYASHENDE17
@MrRajputHacker
Also
@GodfatherOrwa
(thanks for your tips on twitter ❤️)
I recently got a 4 digit Bounty amount 😍😍😎.
A 1000$
You can also exploit here is how. Steps to reproduce.
1- go to PayPal
2- Open two accounts.
3- deposit 1000$ in one account.
4- now transfer 1000$ into the second account and take a screenshot.
5- Post it
#bugbountytips
😎
Hey guys stop tweeting your Bounty screenshots here and everywhere. Someday Indian govt gonna notice it and will implement 63% tax on it.
And you will have to pay even if it's Dupe🥲😹. Be careful 🤫
#bugbountytips
#bugbounty
#Budget2022
The moment I saw the request...i knew I was gonna exploit it. I couldn't believe that they were passing the SQL queries on request.... however they tried hard to hide this request.
Tip - always check loggers and try to intercept as many requests as you can.
#SQL
#sqlinjection
I am gonna find 1 vulnerability in epic games in the next 3 days , or i won't hack for this entire month 😤😤.
If it is accepted I will be giving 1 pentesterlab/pretty recon to 1 person 🥸
It's me vs me .....plus epic games😤😤... let's do it🎉
@anishbakshi
@kadaipaneeeer
His ultimate goal is to feed children and the poor by whatever he does and it takes courage....so aapse req hai bkwass na kre
When you get blocked by any kind of protection mechanism or WAF
Next time try this
This is something which the developers or internal employees of the company uses.
@MrRajputHacker
@ADITYASHENDE17
Give it a try sometimes 😉😉
#infosec
@bugbounty
My friend watching me put anything in the feed back form and asking me have you lost your mind ?? Why are you coding in the feedback form??🤣🤣
("><script src=></script>)
Me -coding this Java script everywhere gives money 😂😂
#BugBounty
There's a small vulnerbilty of HTML injection that i have found a lot when it comes to signup somewhere or invite users from their email.
Way to exploit
1-in the first name parameter put the HTML payload something like <img src="https//malicious website dot com">
#bugbountytips
The application has added one param which is txt , this is basically being used for tracking the user IP ,
But also is beneficial for exploiting an SQLi 😜😜... here's to one more SQLi
Check all the params , you never know 😉
#SQL
#bugbounty
#bugbountytip
Have anyone Ever reported something like an Unauthenticated Password change to some org😂😂🤣....I can Literally Brutefroce Current password for thousand of users and change their password
@MrRajputHacker
@ADITYASHENDE17
Piro Logic by Dev😜
#Bugbountytips
#Bugbounty
Sometimes your Stored XSS payload doesn't get triggered But,
It can do something else , it can crash the application.
Well this is how
After login , in email parameter in the account provided the payload
"onclick=prompt(1)><svg/onload=prompt(1)>"
#bugbountytips
#infosec
Got a lab for testing for interview purpose
Found
1- RCE
2- SQLi
3- stored XSS
4- Reflected XSS
5- Admin account takeover by IDOR in profile
6- Admin ATO via reset password
7- Admin ATO via stored , blind xss
All in 10-20 minutes , wish BB was like this someday 🤣🤣💀
Just hit one BXSS.
Had an option to add an entity in my account ( the entity i can't disclose) ...added multiple entities with BXSS payloads and then invited another user with one of the entities...the user logs in using the invite and the payload fires(entity name is vulnerable)
I had earned a couple thousand $$$$ last month from bug bounty on the
@Bugcrowd
, with one Collab.
Bugs exploited
SSTI/RCE ,
Priv escalation
Xss
Tip - deeeeeeeeeeeeeeeeeeeeeeep Recon 💀
What is this behaviour ??🥺
Interviewer - What will you do if you found SNMP port Open??
Me - Will Google it
Interviewer -
Me -
I don't understand why did he cut the call in middle of the interview 🙄😐
I mean that's how we hack things right??
Googling??🙄🤷
#infosecurity
I created my own application and connected it to a DB, i exploited a time based SQL injection, then emailed it to my other email ID.
From my other email ID , reverted on the email that this is indeed a valid finding and then awarded 200k$ in bounty.
Waiting for the bounty 🥳
Exploited a quick blind XSS,
There is a portal , for you to register you have to send your full name and your email id.
There is an option to write a comment explaining why you want that account.
Put a Blind XSS there and it gets executed within 2 minutes 😍
#bugbountytips
Don't ever doubt a Hacker!!!
We can destroy a database just to find our our crush Mobile number 😭😂😂😎.
But always stays Ethical 🙋
Mereko to mil gaya crush ka number 😂😂
baki ke 8-10 lac numbers ka kya kru frndss??
#infosec
Hey
@Bugcrowd
i was thinking maybe someday in future 👀👀, how about a live hacking event being hosted in India ??
I am pretty sure all our hackers will love this event and the place. A lot of hackers will be excited for this event in India 🥷
What a shame
@bounceshare
I reported a critical vulnerability and your team fixed it without even replying to my emails.
No one's gonna trust you guys even if you are running a BB program. Remember that you are cheating with researchers where you sink in the future.
So i sent an XSS report to the Dev team in my org, and they fixed it really quick and sent it back to me for revalidation
The fix
<script>alert (1)</script> --> 403
Same payload URL encoded - Pop up😂😂😂
This blocker is a living proof that sometimes, how unfair a program can be 😂😂
@Bugcrowd
Lol it's been 5 months and the customer didn't respond to the RAR🤣🤣
Deep down they know they were unfair ☠️
Nothing specific about Cyber Security
But these people have amazing personalities and are very grounded.
Would like to give a shout out to the best people I have met online.
@krishnsec
@ADITYASHENDE17
@bug_vs_me
@MrRajputHacker
Retweet if you agree/comment your fav ones🥳
Hi infosec community and hackers.
I need a little help from the community.
One of my colleagues dad has been in ICU for weeks and his condition is critical. We have already invested more than we had and now we ran out of money. We are raising funds for his treatment.
#infosec
Creating users with Usernames like
Admin
And keeping the password as
Admin , Admin
@123
,
If the application allows , it's fun, someone's gonna report it as default credentials 🤣🤣🤣
#bugbounty
Sometimes i feel i know nothing... nothing at all ...not even zero , I am in minus actually in infosec.
Got a JD for a Job in infosec and my mind is totally blank.
Feels like i am so behind of everything 🥺🙄.
Here is the JD in the thread below 👇
Blind XSS is so much fun and tricky sometimes,
You will have to wait for it to trigger.
And these were present very deep in the application, i am literally crying trying to create video POC🥲🥲🥲
Can someone suggest a good way to remember where we exploited it ??
#BugBounty
50 years from now , lying on my bed breathing my last moments and someone asks
Any last wishes??
Me - Give me my laptop and an application, want to exploit an RCE👀😂😂😂
#bugbounty
#hacking
Whenever I open twitter
There are 2 mandatory tweets that I see
1st from
@bug_vs_me
saying congratulations 🎉 to hunters
2nd from
@sachin_pandey98
saying
🔥🔥🔥 to hunters
I don't close twitter until I have seen these both😜😜🤣
I just gave an interview and the interviewer was not ready to accept that there's something called RCE and DNS exfiltration via SQLi
Now i am depressed AF, because i have literally exploited it a few weeks ago
Idk wtf i did exploit then🥺🥺🤷...i am going back to basics 🥲
In October 10 of my reports were marked NA(Blindly) , my 13 of reports got duplicated, 42 reports were rejected and finally 21 were ignored and I got frustrated 263 times.
#Together
we get depressed harder 💪💪👽