Use NextJS? Recon ✨
A quick way to find "all" paths for Next.js websites:
DevTools->Console
console.log(__BUILD_MANIFEST.sortedPages)
javascript:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));
Cred = linkedin.com/in/0xsojalsec?…#infosec#cybersec#bugbountytips
Unauth RCE in Bricks ≤1.9.6
The /bricks-api/import endpoint allows unauthenticated template imports; attacker-controlled JSON can carry PHP/payloads that the render_element routine processes in an eval‑like manner, resulting in full RCE.
#WordPress#RCE#BugBounty
Define the depth of your crawl with katana's -d flag.
The higher the depth, the more recursive crawls and juicy data you get! 🤤
⚠️ Higher depths can lead to long crawl times against large web applications.
JShunter
JShunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vulnerabilities, making it an essential resource for developers, bug bounty and security researchers.
github.com/cc1a2b/JShunter
Someone make a subdomains database containing 1.6 billion subdomains scrapped from multiple public (and private) sources.
This database is now public and FREE and can be queried on the following website.
- dash.pugrecon.celes.in#infosec#cybersec#bugbountytips
Misconfig Mapper: A fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets
GitHub: github.com/intigriti/misc…
XSS via Prompt Injection 💥🧠🔓
🤖 Find a chatbot
🧠 Ask what model it is
🔁 Get it to repeat text
⚠️ Make it say: '"><img src=x onerror=alert()>
💥 Escalate to Reflected/Stored XSS via URL param
BreachForums has possibly returned at their original Onion address with what looks like it's original data.
I verified the Canary with the PGP and it is valid.
http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd[.]onion