Amit Kumar 🇮🇳

346 posts

Amit Kumar 🇮🇳 banner
Amit Kumar 🇮🇳

Amit Kumar 🇮🇳

@Amitlt2

Microsoft Q1 Top Researcher 2022 & Secured 100+ Applications | Web, API and Android Pentester | Security Analyst | Philophobia Guy |

Kolkata, India Katılım Temmuz 2020
405 Takip Edilen451 Takipçiler
Amit Kumar 🇮🇳 retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
🔥api restriction bypass using fake parameter☠️ /api/public => unauthorized /api/public/latest?anything=/api/public => 200ok you can FUZZ like: ?admin=true, ?bypass=1, debug=true, OR add header “X-Custom-IP-Authorization: 127.0.0.1” Join my telegram t.me/ShellSec
DarkShadow tweet media
English
7
74
541
23.7K
Amit Kumar 🇮🇳 retweetledi
Intigriti
Intigriti@intigriti·
Want to find more vulnerabilities using BurpSuite match & replace rules? 🤑 Open this thread! 🧵 👇
Intigriti tweet media
English
6
181
722
61.8K
Amit Kumar 🇮🇳
Amit Kumar 🇮🇳@Amitlt2·
@hackerspider1 @KiaInd @Apple @Tesla Totally agree. 💯 For me, @KiaInd stands out as the best option in this price segment in India. Premium features, strong quality, and real value for money. My 2022 Kia Carens has already done 42,000 km and I still don’t regret choosing it for a second.
English
0
0
2
187
Shubham Gupta 🇮🇳
Shubham Gupta 🇮🇳@hackerspider1·
Hi @KiaInd 👋 I own a 2021 Seltos DCT GTX+ driven just 25k km and still in love with it. I’m not a car enthusiast… I’m a tech enthusiast. That’s why the new Seltos with ADAS + Digital Key 2 (especially the @Apple integration) love it. @Tesla is the dream, sure… but ₹70–80L dreams are different level in India 🥲 Meanwhile Kia is out here bringing serious tech to real people. Respect for that. Now the only obstacle between me and the new Seltos? My mom. She said: “Car chal rahi hai na? Then why upgrade?” She’s the real CEO at home. So @KiaInd… Should I listen to her… or should I listen to innovation? 😅 maybe help me win this argument at home. Is there any smart upgrade/trade option for me that won’t hit the wallet too hard?
Shubham Gupta 🇮🇳 tweet media
English
2
1
24
2.1K
Amit Kumar 🇮🇳 retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
💀RCE in mail☠️ In Login/register page: 1. Insert a normal mail and intercept on burp 2. Replace the mail to OS command payload 3. Don't use space in the payload 4. Replace space to ${IFS} 5. Try blind OS injection using burp collab URL Join my telegram t.me/ShellSec
DarkShadow tweet media
English
4
80
555
25.2K
Amit Kumar 🇮🇳
Amit Kumar 🇮🇳@Amitlt2·
The bug bounty rollercoaster I reported : 🔓 Critical data leak (15,000+ records) – No reply 🎯 5 Reflected XSS findings – All marked duplicate 🔄 SSRF with internal access – No reply Hunt continues! Consistency > instant wins. #xss #bugbountytips #InfoSec #ssrf #Hacking
English
0
0
0
175
Amit Kumar 🇮🇳
Amit Kumar 🇮🇳@Amitlt2·
DAY 1: Found R XSS via iconURL parameter 🕵️💰 https://Redacted/o/marketplace-app-manager-web/icon.jsp?iconURL=https:///%22%3E%3Cimg%20src=x%20onerror=alert(document.domain)%3E Portal: Marketplace manager Bug: Reflected XSS #XSS #BugBounty #WebSecurity #Hacking #InfoSec
Amit Kumar 🇮🇳 tweet media
English
0
0
0
119
Amit Kumar 🇮🇳 retweetledi
the_IDORminator
the_IDORminator@the_IDORminator·
Lets learn Auth Bypass via Session Stuffing! Easy P1s to find if the target is susceptible. Ok, so what's "Session Stuffing"? In the wonderful land of server-side code, developers can use session variables to store information. These variables can be things like your username, your user id, your preferred pickup location for groceries, really anything. These variables are stored server side only, so in general, some action triggers creating or changing them. Imagine we have a variable scope called "session" (that stores the session variables). So we may have a "session.userId" and "session.userName" and "session.idLoggedIn". Login Dialogue When you enter the correct username and password on a login screen, the server could decide it wants to store your user name, and the fact that you are logged in. So server code may say "if session.isLoggedIn = true, do some lookup using session.userName". You with me? Forgot Password Nobody that is already logged in would need to hit a forgot password screen right? So devs don't necessarily think of this use case. But imagine you open the forgot password screen intended for unauthenticated visitors, after already having logged in. Lets say the forgot password box asks for your username, so it can send you a password reset link or ask you a password reset question. It needs to know if you have an account first. It temporarily sets session.userName to whatever you type in. Lets stuff this puppy So what happens if we login to bobs account? Server sets: session.isLoggedIn = true session.userName = bob Now while still logged in, we pivot to the 'forgot password' tab. We key in username "tina". Server temporarily sets session.userName = "tina" to pull back password reset questions. Back on bobs account page, I now hit refresh, and I'm now logged in and see all of Tinas information, and actually have become Tina. What happened here? The doofus devs used the same session variable for forgot password and login dialogues and did not force logout when utilizing password reset. So one page stuffs/replaces a variable in an already authenticated session, resulting in a total auth bypass for anyone else's account via username only. Result? I've done this on some Fortune 10 websites, some banking software used by 1000s of banks, and on some electric utilities (all with permission). In the case of the online banking software, it was absolutely terrifying that something this dumb could have led to many, many millions in theft. Make sure to test for dumb stuff like this! And people say hacking is hard... 😜 #CyberSecurity #infosec #bugbounty #Hacking
GIF
English
9
62
370
14.6K