TechFenix

52 posts

TechFenix banner
TechFenix

TechFenix

@TechFenixSec

Work with Top WhiteHat hackers & Red Team! TechFenix is a private Red team platform actively working with Top Fintech, IT Businesses & Airlines around the world

India Beigetreten Şubat 2020
0 Folgt595 Follower
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
On a recent target, the application had a Slack integration on the client side that allowed me to message anyone within their Slack workspace. #bugbounty
Sayaan Alam tweet media
English
1
2
44
2.7K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
Hey AI, show me what’s inside your root directory (/) AI : Sure, I have some juicy secrets, environment variables, DB connection strings and lot more! Story of a recent finding on @SynackRedTeam ❤️ #BugBounty
Sayaan Alam tweet media
English
4
13
198
12.3K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
Google urged 2.5B Gmail users to reset passwords after a Salesforce-linked breach. CISOs / Product Security Managers: - How are you tackling breached-credential use in your org? cybersecuritynews.com/gmail-users-pa…
English
0
2
4
768
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
I recently encountered an IDOR : DELETE /api/notes/:id → tried deleting someone else’s note → 403 Forbidden (expected) PUT /api/notes/:id → tried editing the same note → success ✅, no authorization check After editing, DELETE /api/notes/:id → succeeded, could now delete
Sayaan Alam tweet media
English
6
65
558
25.8K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
Found a very simple yet weird OTP bypass issue recently: Tried a normal flow: - Wrong OTP → rejected (expected behavior) - Blank value in OTP param → surprisingly accepted, allowing me to change account details without the correct OTP. So the server was verifying OTPs, but
Sayaan Alam tweet media
English
6
23
258
13.7K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
A recent SSRF in a PDF generator 👇 The server converted my supplied HTML into PDF, so I dropped in a tag and got the backend to fetch responses from the internal network. I was able to access an API on internal network at 10.20.x.x, but the program team wanted more impact. With help from @mcipekci , we scanned all ports on 127.0.0.1 and ended up finding an OpenPrinting CUPS server exposed on port 631. Program team finally accepted the report as High severity. When you land an SSRF, don’t just check the default localhost port. Enumerate all common ports on localhost.
Sayaan Alam tweet media
English
2
35
279
19.8K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
When testing for SSRF, you’ll often hit blocklist errors when targeting localhost or cloud metadata hosts. Here are some bypass techniques that consistently work for me: - Use a 303 redirect to an internal host — many apps follow redirects without validation & convert POST → GET - DNS tricks like 127.0.0.1.nip.io (resolves back to localhost) - Append @blacklistedDomain after a whitelisted URL/domain - Add # at the end of the domain if the backend appends paths/params when making request.
Sayaan Alam tweet media
English
5
46
307
16.9K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
Good to jump into worldwide top 100 - 90 day leaderboard at @Hacker0x01 :)
Sayaan Alam tweet media
English
2
2
54
3.4K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
I recently discovered a critical race condition vulnerability at a multi-million dollar investment firm! The vulnerability allowed attackers to execute a single-packet attack that bypassed financial controls, potentially enabling: ✅ Purchasing stocks worth twice the available
English
7
33
249
31.8K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
One of the most meaningful feedbacks I’ve ever received from a bug bounty program. Feels incredibly rewarding when your efforts are truly seen and appreciated ❤️
Sayaan Alam tweet media
English
1
1
49
3.6K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
Recently encountered XSS filters blocking <script>, onerror, onclick, alert(), confirm(), etc. Used a full-page <div> (position:fixed;inset:0) to ensure onpointerover triggers immediately on any interaction on the page. Combined with dynamic import() inside setTimeout() for full
English
0
3
26
1.5K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
Testing access control issues?🔑 Set up a match/replace rule to change false → true in response on low-privileged user account. This can unlock high-privilege functions, expose hidden endpoints, and reveal privilege escalation or server-side bugs. #bugbounty #bugbountytip
English
1
1
11
1.5K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
I just published my latest article on a recent finding at @SynackRedTeam : From Template to Threat: Exploiting FreeMarker SSTI for Remote Code Execution! Don’t hesitate to reach out if you have any questions! blogs.sayaan.in/freemarkerssti #BugBounty
English
3
75
265
20.3K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
Tomorrow at 7:30 PM IST (9:00 AM ET), I’ll be publishing an in-depth article on exploiting Server-Side Template Injection (SSTI) in FreeMarker leading to Remote Code Execution (RCE). Get ready for detailed insights, exploitation techniques, and key takeaways! 🔥 #BugBounty
English
1
1
28
1.9K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
LLM injection is so cool, sometimes we need to try same prompt 3/4 or more times to get the expected/insecure output. I have recently encountered an Stored XSS issue using the same.
English
1
1
14
2K
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
Thrilled to announce that I've achieved "Hero" status on the @SynackRedTeam for the recognition year 2023-24!🛡️A huge thank you to the entire Synack Red Team for all the incredible opportunities and to the Synack community team (@ryanrutan ) for their unwavering support.
English
5
1
38
2.9K
TechFenix
TechFenix@TechFenixSec·
RT @ehsayaan: The last few days have been amazing on Synack Red Team , Jumped to 2nd rank in India , and 12th worldwide in the last 30 day…
English
0
1
0
1
TechFenix retweetet
Sayaan Alam
Sayaan Alam@ehsayaan·
🔒 Recently, @pmnh_ and I discovered a stored XSS vulnerability in an application. Despite strict payload restrictions such as