Magn4

187 posts

Magn4

Magn4

@Magn4_

A guy who has a love hate relationship with minified JS

Germany / Morocco Katılım Şubat 2022
399 Takip Edilen1.7K Takipçiler
Sabitlenmiş Tweet
Magn4
Magn4@Magn4_·
New Video Out 🙌 In this one i explained what Client Side path traversal is, how to find it, and how to exploit. So even if you have no idea what it is, you will have all the knowledge needed to find one after watching the video. This is by far my best video so far, and on my favorite bug, so i hope you guys will enjoy it, and learn something from it youtube.com/watch?v=T6BKQ2…
YouTube video
YouTube
English
2
28
191
31.5K
Patrickbatman
Patrickbatman@hamidonsolo·
Two characters broke an entire platform. ../ That's it. That's the payload. for $2,500. I put a path traversal in a URL hash fragment — the # part that the server never sees. No WAF caught it. No server log recorded it. No security tool flagged it. Because the attack only existed in the browser. JavaScript parsed the hash. Built an API request with it. Zero validation. I redirected it to the email change endpoint. One click: → Victim's email changed to mine → Password reset sent to my inbox → Full account takeover → Every secret in the system leaked → Victim locked out permanently I almost didn't test this feature. It looked boring. Nothing interesting. I was about to close Burp and go to bed. Glad I didn't. $2,500. I wrote the full story — the 1am discovery, the chain, the severity fight, and why the boring features are where the best bugs hide. Full writeup ↓ patrickbatman.hashnode.dev/how-i-took-ove…
English
18
42
324
17.3K
Magn4 retweetledi
slonser
slonser@slonser_·
I really love this poll because it lets you discover a lot of great research from the past year that you might have missed. I've decided to highlight the Сlient-Side related research that I think is especially worth your attention.
PortSwigger Research@PortSwiggerRes

Voting is now live for the top ten web hacking techniques of 2025! Grab a coffee, browse the 61 quality nominations and cast your vote on the most creative and ground-breaking techniques: portswigger.net/polls/top-10-w…

English
3
23
92
9.1K
Zakaria (H4X0z) 🇵🇸
Just received my 2nd bounty from Amazon! Big thanks to my friend @mo7meadwael for the collaboration on this one. The grind continues. On to the next one! 🎯🎯 Alhamdolilah
Zakaria (H4X0z) 🇵🇸 tweet media
English
8
1
76
2.6K
Magn4
Magn4@Magn4_·
@O_x_Ashura Happy to hear that my man, make sure to take good care of you mental health as its more important than any bug or bounty ( for the long term ).
English
1
0
1
47
0xAshura
0xAshura@O_x_Ashura·
@Magn4_ Thanks bud. Your videos help to get out from burnout.
English
1
0
1
51
Magn4
Magn4@Magn4_·
After uploading this video, I noticed that many people struggle with the basics, like reading JavaScript. Since I want to move on to more advanced client side techniques, I’ve decided to dedicate my next few videos to covering fundamentals such as Minified JavaScript analysis, DOM XSS Taint flow, OAuth, and similar topics. PS: These will also help you find IDORs and BAC issues, as I will show some ways you can extract the target's API endpoints from their JS files.
Magn4@Magn4_

New Video Out 🙌 In this one i explained what Client Side path traversal is, how to find it, and how to exploit. So even if you have no idea what it is, you will have all the knowledge needed to find one after watching the video. This is by far my best video so far, and on my favorite bug, so i hope you guys will enjoy it, and learn something from it youtube.com/watch?v=T6BKQ2…

English
12
15
208
13.1K
Magn4
Magn4@Magn4_·
@marwanmoha96781 Im still planning what i should talk about, but i will make sure to make it as good as i can
English
0
0
3
98
mariolitonito
mariolitonito@marwanmoha96781·
@Magn4_ yes please if it's possible to make a long video about reading js files
English
1
0
1
323
garou
garou@mhmdqdw09781013·
@Magn4_ Thanks for helping video that you make🌹 We will wait for advanced techniques else 😁
English
1
0
1
240
Magn4
Magn4@Magn4_·
@4osp3l Happy to hear that 🫡
English
0
0
7
214
Gospel
Gospel@4osp3l·
@Magn4_ Your video made me understand CSPT; thanks man.
English
1
0
4
371
Magn4
Magn4@Magn4_·
@mustafamahmvd Thanks man, i appreciate the comment 🫡🙌
English
0
0
1
319
Mustafa
Mustafa@mustafamahmvd·
@Magn4_ CSPT was an amazing video bro, keep going
English
1
0
3
377
Magn4
Magn4@Magn4_·
@4osp3l Sorry i just noticed that i didn't comment on this 😭 Thanks man for the constant support 🫡❤️
English
1
0
2
359
Magn4
Magn4@Magn4_·
New Video Out 🙌 In this one i explained what Client Side path traversal is, how to find it, and how to exploit. So even if you have no idea what it is, you will have all the knowledge needed to find one after watching the video. This is by far my best video so far, and on my favorite bug, so i hope you guys will enjoy it, and learn something from it youtube.com/watch?v=T6BKQ2…
YouTube video
YouTube
English
2
28
191
31.5K
Magn4
Magn4@Magn4_·
@3ugman Thank you very much, i really appreciate it 🙌🙌
English
0
0
4
165