Sunny

77 posts

Sunny

Sunny

@hack1or0

India 가입일 Şubat 2021
700 팔로잉28 팔로워
Sunny
Sunny@hack1or0·
@IndiGo6E Could you please let me know the status for today's 6E781 flight,it's been running late daily nowadays. Waiting for a prompt response!
English
0
0
0
13
Sunny
Sunny@hack1or0·
Hello Everyone Anyone looking for BSides Ahmadabad individual passes at much discounted price.
English
0
0
0
22
BSides Goa
BSides Goa@bsidesgoa·
BSides Goa Phrase Challenge - Win a T-shirt! 🎉 Hey BSides Goa Community! 👋 Ready for a challenge? Complete the phrase: 'The first rule of BSides Goa is...........' In the most creative way and stand a chance to win a BSides Goa T-shirt! 🧠💬 How to Participate: 👍 Follow @bsidesgoa , like and repost the tweet. 🤔 Complete the phrase with your unique twist. 💬 Comment your phrase below or post it on Twitter/Instagram using #BSidesPhraseChallenge. 🏷 Don't forget to tag us! Prize: 👕 The best phrase will win a BSidesGoa T-shirt! 🎁👏 Deadline: 12/12/2023⏰ Unleash your creativity, and let the phrase magic begin! Good luck! 🚀📜 #Bsidesgoa #Giveaway #tshirt #challenge #CyberSecurity #infosec #BugBounty #Hacking #bsides
BSides Goa tweet media
English
19
15
38
6.9K
Faiyaz Ahmad
Faiyaz Ahmad@thehacktivator·
Some more good reviews on my latest "The Art of Web Reconnaissance Course"♥ If you also want to learn Basics-Advance web recon techniques then get my course for 90% discount Coupon: 8B5894BFA5BB5CD00C1F Link: udemy.com/course/the-art…
Faiyaz Ahmad tweet media
English
2
1
18
3.2K
Donato Scaramuzzo
Donato Scaramuzzo@ramirezVII·
Broken Access control trick. If the server responds with a JSON containing roles and functions expected for the user, try modifying that JSON. You may be able to access unexpected features. #pentesting #owasp #accessControl
English
1
3
12
1.8K
JS0N Haddix
JS0N Haddix@Jhaddix·
My work has sponsored TWO more tickets to tbhmlive.com . Follow @BuddoBot from now until beginning of next week to enter in a 2nd chance for a free ticket!
English
31
46
174
31.3K
Sunny 리트윗함
JS0N Haddix
JS0N Haddix@Jhaddix·
Ok fam. I’m giving away TWO free tickets to my course which takes place in two/three weeks. All you have to do to win is like, retweet this tweet, and reply with “tbhmlive.com!” I’ll pick winners next week! If you haven’t seen my course, check out the link!
English
698
687
899
160.2K
Jayesh Madnani
Jayesh Madnani@Jayesh25·
🔐 Show & Tell: Uncovering a Simple Web Cache Deception Vulnerability That Paid Off 💰💰 Cache Deception issues might seem complex, but with the right approach, they're straightforward and can lead to generous rewards, ranging from $1,000 to $10,000, depending on the impact. Today, I'll share how I discovered a basic web cache deception issue that allowed me to access users' PII data through caching, resulting in a "High" payout. Here's my step-by-step approach: 1️⃣Got Invited to a private program - My first move was to inspect the Request/Response headers for common misconfigurations. I immediately spotted common cache headers like Server-Timing, CF-Cache-Status, X-Cache, X-CDN, etc. 2️⃣Identifying interesting cache headers - Once I pinpointed these headers, the next step involved analyzing the application's behavior. I sent sample endpoints/APIs to Repeater and appended tricky paths to the URIs. For example, if the path "https://target(.)com/api/v1/users" returned sensitive PII, I tried appending variations like "https://target(.)com/api/v1/users/self.css" and "https://target(.)com/api/v1/users/self/.js" to observe if there was a cacheable response. 3️⃣A straightforward cache issue - In my case, it was a simple cache issue as the endpoints returned HTTP 200 with the appended suffix and response with a cache HIT :) The attack scenario involved crafting and sending a malicious link, "https://target(.)com/api/v1/users/self/.js?cachebuster" to a victim. When the victim, already logged in, opened the link, it led to caching the victim's PII data due to the misconfiguration. 4️⃣Exploiting the cache - When navigated to "https://target(.)com/api/v1/users/self/.js?cachebuster" as an attacker using Chrome Incognito, the cached response was found containing the victim's PII data from "/api/v1/users/self/" resulting in a risk of sensitive information disclosure. While this was a relatively straightforward scenario, more complex techniques can help escalate these Issues to an ATO by chaining CSRF, XSS, etc., potentially requiring parameter mining and/or bypassing limitations. We'll look into these examples in future tweets! Takeaway: Always keep an eye out for cacheable response headers and ensure this vulnerability class is part of your checklist. If you find a cacheable response but can't exploit it, feel free to drop a message for collaboration. 😊 Thanks for reading! #HackerOne #BugCrowd #SecurityTips #BugBountyTips #Security #WebCache #BugBounty 💻🔒
Jayesh Madnani tweet media
English
9
98
442
38.6K
Sunny
Sunny@hack1or0·
@CristiVlad25 Weak password complexity.... Atleast 12 char with camel case, numbers and special char should be considered as strong password
English
0
0
2
236
Jayesh Madnani
Jayesh Madnani@Jayesh25·
🔒 Question of the day: How to hunt on restricted web applications protected behind a login page? 🤔 Well, guess what? While most folks tend to overlook these targets, I've pocketed over 5 figures $$$$$💰 from such apps. Bounties for findings on these assets often result in generous High/Crit payouts, ranging from $2,000 to $10,000. 💸 Here's a rundown of what you can do to uncover issues with such targets: 1️⃣Response Manipulation: Create a "match and replace" rule in Burp Suite to swap "false" with "true" and 403/401 status codes with 200. After this, try accessing the app and log in with an incorrect password while keeping Burp Suite active. 🛡️ This trick can often reveal whether the app relies on client-side validation for such apps, potentially granting unauthorized access due to lack of server-side authorization checks. 2️⃣Brute Force: Test common username/password combinations. Many such apps use predictable credentials, like admin:admin, admin:password, etc. 3️⃣SQL Injection: Perform SQL Injection on the login for these targets using tools like SQLMAP or Ghauri. It may take some time, but since it's just a single request, it's definitely worth a shot. Prepare to be amazed by the results! 😲 4️⃣JS endpoints: Review all exposed JS files on the page and extract endpoints using JSBeautify/LinkFinder. Often, you'll discover APIs that are vulnerable to IDOR/Information disclosure, even without authentication, potentially leading to nice bounties. 5️⃣Directory Fuzzing: Utilize FFUF or equivalent tools to fuzz for directories. You can find excellent wordlists at wordlists.assetnote.io, tailored to the web application's underlying technology. 6️⃣Breached Credentials Services: Many people employ these services to search for org employees or other credentials linked to the target. If found, they often test them to access the admin page and report the findings (Note - not all programs accept this). 7️⃣Wayback: Always check for archived URLs related to the target, as they may reveal accessible paths without authentication, providing direct access to the dashboard. There are many more tricks to get around such target apps. We'll talk more in detail with specific examples in future tweets. 🚀Lesson: Do not ignore these types of apps, as they are often a goldmine! 🕵️‍♂️🌐 #Cybersecurity #BugBounty #WebSecurity #hackerone #bugcrowd #securitytips #questionoftheday #bugbountytips #earn #bounties
English
23
119
521
39.8K
Jayesh Madnani
Jayesh Madnani@Jayesh25·
🔒Sharing more secrets - It's 2023, and CSRF issues are far from extinct. In fact, I've discovered and reported 100+ CSRF vulnerabilities this year, raking in five figures $$$$$!💰 🚀 My top 5 CSRF bypass techniques and their secrets to success: 1️⃣ Swap "POST" with "GET": Instead of using POST requests, switch to GET and move the body parameters into the URI. This simple maneuver often overrides CSRF token implementations, enabling a full-blown CSRF attack. 2️⃣ JSON Requests: Even JSON requests relying on cookies can be vulnerable to CSRF. Here's the trick: send your request with a content-type of text/html and format the body in JSON. In some cases, if the application doesn't rely on the content-type header, CSRF can still work its magic. 3️⃣ Don't Blindly Trust CSRF Tokens: Just because an application has a CSRF token doesn't mean it's foolproof. Sometimes, backend validation for these tokens can be flawed. This means that even with the same token, a CSRF attack may still work on other users' accounts. 4️⃣ Remove the CSRF Token Parameter: Believe it or not, some applications are designed to support legacy versions. If you try removing the CSRF token parameter from the request, it may still work. This is often because apps have dual implementations, and if the parameter is missing, they fall back to the legacy version to support older versions of the app, which can often be vulnerable. 5️⃣ Legacy Endpoints: Hidden in JS files are legacy endpoints that may no longer be actively in use, but they can still be functional and vulnerable to CSRF attacks. These abandoned endpoints are usually not maintained or updated to the latest security standards, making them prime targets for CSRF exploitation. 🎯 Lesson: CSRF issues are not to be underestimated. They are often hiding in plain sight, waiting to be discovered, and they can offer substantial bounties. Happy hunting, and enjoy the rewards! 💎💻 #Cybersecurity #CSRF #BugBounty #InfoSec #hackerone #bugcrowd #cybersecuritytips #securitytips 💰💡
English
18
143
572
45.6K
Sunny
Sunny@hack1or0·
@jayesh25 Share some tips regarding aspx please
English
1
0
1
2.3K
Jayesh Madnani
Jayesh Madnani@Jayesh25·
🕵️‍♂️Here's another secret no one will tell you about: A Simple WAF Bypass for Stored XSS that has earned me $$$$💰 so far! Stored XSS issues can fetch you rewards ranging from $500 to $7500, depending on the program. WAFs can pose significant challenges when hunting for Stored XSS vulnerabilities, but this simple trick can help you bypass them. By adding 'Content-Encoding: any_random_text' to the request header, you can deceive some WAFs, allowing your payload to slip through undetected. Enjoy the hunt! #bugbounty #securityTips #ethicalhacking #WAFBypass #hackerOne #bugcrowd #bugbountytips
Jayesh Madnani tweet media
English
61
449
2K
144.2K
Sunny 리트윗함
InfoSec Community
InfoSec Community@InfoSecComm·
"Ways I followed to Bypass ‘403’ — Your checklist" is a fantastic article written by Suprajabaskaran where they have discussed in depth about different tricks to bypass 403 in web applications. Read here: infosecwriteups.com/ways-i-followe…
English
2
47
206
27.8K
Sunny 리트윗함
freeCodeCamp.org
freeCodeCamp.org@freeCodeCamp·
GraphQL has changed the way developers interact with APIs. Many apps use GraphQL to source data, so it's a good thing to know as a dev. In this course, you'll learn everything you need to know to create robust & efficient data-driven applications. freecodecamp.org/news/graphql-d…
English
1
84
455
71.8K