himanshumonu

97 posts

himanshumonu banner
himanshumonu

himanshumonu

@74himanshukumar

🕉

Katılım Mart 2022
133 Takip Edilen16 Takipçiler
Evan Klein
Evan Klein@EvanKlein338226·
The vuln type that made me the most money is ___ Mine: IDOR. Not the flashiest, but consistent 💰 Yours?
English
1
0
4
288
Evan Klein
Evan Klein@EvanKlein338226·
Controversial take: AI is making bug bounty both better AND worse at the same time. Better: faster recon, pattern recognition, report writing Worse: noise from script kiddies running AI-generated scans, more dupes, lower signal-to-noise Where do you stand? Is AI net positive or negative for the industry?
English
1
0
0
74
Evan Klein
Evan Klein@EvanKlein338226·
Unpopular opinion: Most bug bounty hunters waste 80% of their time on recon tools when they should be spending that time actually understanding the app's logic. What's your recon-to-actual-testing ratio? Be honest.
English
1
0
3
81
himanshumonu
himanshumonu@74himanshukumar·
@EvanKlein338226 rate limit bug not accept by programme, password change doesnt invalidate session.
English
0
0
0
5
Evan Klein
Evan Klein@EvanKlein338226·
Top 3 auth mistakes I keep finding in pentests (thread): 1. No rate limiting on login endpoints - brute force in minutes 2. Password reset tokens that don't expire 3. Session tokens surviving logout (backend doesn't actually invalidate) What's the worst auth bug you've found? 👇
English
1
0
0
27
himanshumonu
himanshumonu@74himanshukumar·
@suslu7616 bro you work for vieh group ? your payload is using by vieh group
English
1
0
0
34
Behi
Behi@Behi_Sec·
I do not run any JS or subdomain monitoring, but I always monitor: - My target's social profiles - Blog posts - Release notes New features mean new attack surface. This alone gives me constant fresh things to test.
English
2
5
71
5.6K
himanshumonu
himanshumonu@74himanshukumar·
@Behi_Sec I choose target, i run katana and start finding endpoint,api keys leakage in js files, 2nd step fuzzing using ffuf, 3rd step waybackurls. after this i change my target and repeat these steps. what is your approach when you hunt on a target ?
English
2
0
1
371
himanshumonu
himanshumonu@74himanshukumar·
@Behi_Sec tell about user registeration asking phone number and verify code on that number. we dont want to share our phone number. what you do in that case
English
1
0
0
31
Behi
Behi@Behi_Sec·
I find it really helpful to anticipate the behavior of my target when I'm testing for a specific bug type. This often gives me ideas on how to bypass potential protections. Do this, and thank me later.
English
2
1
30
1.6K
Behi
Behi@Behi_Sec·
4 easy ways I discover hidden endpoints: • Waybackurls • Reading all API docs • DuckDuckGo dorks • Digging inside JS files What methods do you use?
English
9
22
202
9.2K
Behi
Behi@Behi_Sec·
These are the bug bounty tools I use: - ffuf - waybackurls - LinkFinder - Arjun - cloud_enum What do you use?
English
12
32
411
17.7K
SIDDHANT SHUKLA
SIDDHANT SHUKLA@ghost__man01·
Hey @AxosBank, I want to report a vulnerability on your website. Please guide me how can I report it so that your customers remain safe and trustworthy of their data. Thanks. #BugBounty
English
1
0
1
47
himanshumonu
himanshumonu@74himanshukumar·
@Behi_Sec Just share all important things related to access control
English
0
0
1
168
Behi
Behi@Behi_Sec·
If you have any questions regarding Access Control vulnerabilities, feel free to ask!
English
9
2
50
4.2K
Behi
Behi@Behi_Sec·
Bug Bounty Tip: If you have a UUID-based IDOR and can't find a valid UUID of other users, do this: Search the endpoints that hold UUIDs on GitHub! You will usually find that other users have left their UUIDs in their sample codes/scripts.
English
4
20
159
6.9K