Mostafa Alrefai

78 posts

Mostafa Alrefai banner
Mostafa Alrefai

Mostafa Alrefai

@__the7th

All Thanks To My God - الحمد لله

Katılım Ağustos 2022
1 Takip Edilen654 Takipçiler
Mostafa Alrefai
Mostafa Alrefai@__the7th·
🧵Bug Bounty Diaries ( D6 ) It's still a VDP, but the chain was EPIC => From CSTI (Client-Side Template Injection) to XSS Gadget + WAF Bypass => From XSS to CSP Bypass => From CSP Bypass to fetch requests => From fetch requests to Cookie hijacking
Mostafa Alrefai tweet media
English
3
4
74
16.3K
Mostafa Alrefai
Mostafa Alrefai@__the7th·
🧵Bug Bounty Diaries ( D5 ) Stored-XSS in the user's first and last name fields This was an old bug in a public bug bounty program, and it could be escalated to exfiltrate user cookies...
Mostafa Alrefai tweet media
English
2
1
66
14.4K
Mostafa Alrefai
Mostafa Alrefai@__the7th·
I wanted to add some information about Exploit 1. After testing the exploit on live targets and a local lab, I validated that the XSS payload will work only if it is a DOM-Based Open Redirect, and if it were a Server-Based Open Redirect, the browser will stop the XSS from running
Mostafa Alrefai tweet media
Mostafa Alrefai@__the7th

🧵Bug Bounty Diaries ( D4 ) How to escalate an "Open Redirect" from P5 to P3 or P1 Yesterday, I found an Open Redirect in a public VDP, and I wanted to teach you the exploitation process that you should take before reporting the bug as a P5 ... thread...

English
0
2
27
2.3K
Mostafa Alrefai
Mostafa Alrefai@__the7th·
🧵Bug Bounty Diaries ( D4 ) How to escalate an "Open Redirect" from P5 to P3 or P1 Yesterday, I found an Open Redirect in a public VDP, and I wanted to teach you the exploitation process that you should take before reporting the bug as a P5 ... thread...
Mostafa Alrefai tweet media
English
5
30
266
30K
Mostafa Alrefai
Mostafa Alrefai@__the7th·
@VAG33K You can bypass authentication and authorization checks, using Math & Replace rules, if it done on the Client-Side only.
English
0
0
0
308
Mostafa Alrefai
Mostafa Alrefai@__the7th·
🧵Bug Bounty Diaries ( D3 ) This was an EPIC hack... TTMG, In this report, I was able to combine 2 vulnerabilities to bypass the login page of an admin portal and log in as an admin, without any username or password Maybe more details in the future...
Mostafa Alrefai tweet media
English
3
7
194
16.1K
Mostafa Alrefai
Mostafa Alrefai@__the7th·
Sometimes, it just happens...
Mostafa Alrefai tweet media
English
1
1
91
2.6K
Mostafa Alrefai
Mostafa Alrefai@__the7th·
@Hoesenbug The popup appears when I inject the payload manually, or send the payload in an old browser.
English
0
0
0
26
Pluto
Pluto@Hoesenbug·
@__the7th But it will encoded hence no pop up ?
English
1
0
0
25
Mostafa Alrefai
Mostafa Alrefai@__the7th·
🧵The Bug Bounty Diaries... This is the first post of a New Series where I talk about bugs that I found in wild Bug Bounty Targets This is a short story about a DOM-Based XSS that I found in a Private Bug Bounty Program, but it was unexploitable due to modern browser mechanisms
Mostafa Alrefai tweet media
English
3
6
87
12.8K
Mostafa Alrefai
Mostafa Alrefai@__the7th·
🧵Bug Bounty Diaries ( D2 ) Today, I found my first "Prototype Pollution" vulnerability in the wild, but it can't be a valid bug to be reported on its own, so when you find a PP, you should dig deeper to combine it with a gadget in order to build a valid report...
Mostafa Alrefai tweet media
English
1
8
117
13.1K
Mostafa Alrefai retweetledi
Mostafa Alrefai
Mostafa Alrefai@__the7th·
@Hoesenbug You send the payload in the parameters part or the fragment part of the URL, to be a part of the document.URL source
Mostafa Alrefai tweet media
English
1
1
1
342
Mostafa Alrefai
Mostafa Alrefai@__the7th·
Why can't we send the payload without URL-encoding? Because in modern browsers, when you send anything in the query part or the fragment part of the URL, the browser should URL-encode it automatically, and this will prevent the attack from being successful.
English
1
0
5
763
Mostafa Alrefai
Mostafa Alrefai@__the7th·
DOM-Based XSS is all about (Source + Sink). In this case, the sink was `document.write` and the source was `document.URL` The problem is that the attack will only be valid if the payload was sent to the sink without URL encoding, as you can see the "alert box" in the screenshot.
English
1
0
4
869
Mostafa Alrefai
Mostafa Alrefai@__the7th·
[*] Bug Bounty Skills... (More Parameters = More Vulnerabilities) Did you know that there are 4 types of discovery techniques: 1. Website Crawling (Active) 2. Hidden Parameter Fuzzing (Active) 3. JavaScript Mining (Passive) 4. Searching Public Archives (Passive) 🧵Thread...
English
4
4
16
6.5K
Mostafa Alrefai
Mostafa Alrefai@__the7th·
Building "AI Hacking Agents" from pure Python...
Mostafa Alrefai tweet media
English
0
1
9
2.5K