Intigriti

14.4K posts

Intigriti banner
Intigriti

Intigriti

@intigriti

Bug bounty & VDP platform trusted by the world’s largest organisations! 🌍

Katılım Mayıs 2016
661 Takip Edilen205.9K Takipçiler
Intigriti
Intigriti@intigriti·
Day 26 of #BugQuest! 🤠 Yesterday's challenge featured a method-specific authorization check where GET requests were protected, but POST/PUT or any other requests bypassed the authorization entirely, allowing attackers to modify any user's profile data. Today's challenge involves GraphQL authorization! This vulnerability pattern was covered on Day 14, where we learned about the importance of finding and testing GraphQL queries & mutations. Can you spot the broken access control in this code snippet? 🐛 Swipe through to see the vulnerable code! As usual, solution will be revealed tomorrow! #BugBounty #HackWithIntigriti #BugQuest
Intigriti tweet mediaIntigriti tweet mediaIntigriti tweet media
English
0
1
5
326
Intigriti
Intigriti@intigriti·
@zazzintan What would your proof of concept/HTTP request look like? 🧐
English
1
0
1
16
zazzintan
zazzintan@zazzintan·
@intigriti We retrieve data using only the orderId and it doesn't depend on the userId. Therefore, any logged-in user can access any order if they have its ID
English
1
0
1
25
Intigriti
Intigriti@intigriti·
Can you spot the issue? Bonus points if you can provide a PoC! 😎
Intigriti tweet media
English
6
1
17
2.6K
Intigriti
Intigriti@intigriti·
⏰ Intigriti's March Challenge is over! ✅ 71 hackers found the correct solution 📑 19 hacker wrote a cool writeup 🏆 Check out the winners below and drop your write-up in the comments! x.com/intigriti/stat…
Intigriti@intigriti

⏰ It's CHALLENGE O'CLOCK! 👉 Capture the flag before Monday the 23rd of March 👉 Win €400 in SWAG prizes 👉 We'll release a tip for every 100 likes on this tweet Thanks @KulinduKodi for the challenge 👇 challenge-0326.intigriti.io

English
1
0
15
2.7K
Intigriti
Intigriti@intigriti·
Day 25 of #BugQuest! 🤠 Yesterday's challenge featured a static keyword swapping technique where the endpoint accepted both "my" and direct workspace IDs, allowing attackers to access other users' workspaces by bypassing a subtle oversight made by the developer. Today's challenge involves another common broken access control vulnerability case. This specific topic was covered on Day 17, where we learned about REDACTED. 😎 Can you spot the broken access control in this code snippet? 🐛 Swipe through to see the vulnerable code! Solution will be revealed tomorrow as usual! #BugBounty #HackWithIntigriti #BugQuest
Intigriti tweet mediaIntigriti tweet mediaIntigriti tweet media
English
2
0
14
1.5K
Intigriti
Intigriti@intigriti·
As Intigriti 0326 wraps up, we're releasing the official write-up for March’s CTF challenge! 🤠 @KulinduKodi presented us with a secure search portal that required chaining a tricky DOM clobbering with a common CSP bypass to achieve client-side code execution on the challenge page on behalf of the admin! 😎 Head over to our hacking blog to read the official write-up! 👇 intigriti.com/researchers/bl…
Intigriti tweet media
English
0
3
27
2.4K
Intigriti
Intigriti@intigriti·
Hi there, thank you for bringing this up! Our apologies for the delay. We're still in the process of investigating why this payout issue hasn't been resolved yet. We'll keep you updated as we progress. If you have any additional questions, please don't hesitate to contact us. We appreciate your patience in the meantime. Thank you!
English
0
0
0
13
Abdul Karim
Abdul Karim@bountykarim·
@intigriti Hey! Even with your intervention, the payment status is still marked as failed.
English
1
0
1
33
Abdul Karim
Abdul Karim@bountykarim·
I reached out to support 30 days ago and still haven’t received a clear resolution. @intigriti your payment support is awaful.
Abdul Karim tweet media
English
1
0
19
1.7K
Intigriti
Intigriti@intigriti·
@marcolivermunz Excited to have you representing the German hacker community as an Ambassador! 💪
English
0
0
1
175
Intigriti retweetledi
Oli (C..1..P.H.Y)
Oli (C..1..P.H.Y)@marcolivermunz·
🚀 I’m now an @intigriti Hacker Ambassador for Germany 🇩🇪 Kicking things off with my first event: 🔥 Bug Bounty Meetup Stuttgart 📅 April 19, 2026 📍 Shackspace (Ulmer Str. 300, Stuttgart) 🕒 14:00 – Open End All levels welcome 🤝 👉 forms.gle/w1oLU61U8DQxSW…
Oli (C..1..P.H.Y) tweet media
English
1
2
26
2.4K
Roll4Combat
Roll4Combat@BadAt_Computers·
Running hot!
Roll4Combat tweet media
English
3
0
66
1.8K