hackermater

298 posts

hackermater banner
hackermater

hackermater

@hackermater11

#: Penetration Tester & Security Researcher | eMAPT

Argentina Katılım Haziran 2023
192 Takip Edilen363 Takipçiler
Sabitlenmiş Tweet
hackermater
hackermater@hackermater11·
It's hard to believe, but after a long time I got my FIRST BOUNTY... and yeah: it was a P1 Critical $3.000 !!!! #bugbountytips don't try to automate everything, use Burp Suite and dedicate at least 1-2 weeks to understand the whole application and do manual hacking ;) #bugbounty
hackermater tweet media
English
28
21
527
23.3K
Kasif
Kasif@md_kasif_uddin·
Be honest, Which one was your first code editor?
Kasif tweet media
English
326
7
410
29.5K
hackermater
hackermater@hackermater11·
Yes! P3 Triaged on Bugcrowd! 💯🤞. Another bug in mobile scope, I'm still waiting for the customer response in this new week! 💪🍀. 🧠 Tip: Always try bypass client-side restrictions/blocks via backend API through Caido/Burp proxy interceptions. #bugbounty #bugbountytips #hacking
hackermater tweet media
English
0
4
105
7K
Magn4
Magn4@Magn4_·
Here is my intended solution for this small challenge. Please let me know if you have any other ones. I have used 2 screenshot, the first one explains what each part of the code does, and the second one shows the solution, and how it goes through the code. I would like to mention that the application that had this CSPT had a pretty strong WAF that blocked all of my path traversal payloads, so to bypass it i had to put it in the hash instead of using the query param as it doesn't reach the WAF and its still read by window.location.href Also, big thanks goes to @garethheyes for the nice code snippets tool (hackvertor.co.uk/snippet)
Magn4 tweet mediaMagn4 tweet media
Magn4@Magn4_

While looking into an application, i found an interesting piece of code that led to an interesting CSPT. And so i decided to share it as a mini Challenge. To solve this you need to take control over the whole path and query params of the POST request. You can run this code in your dev tools console on a website like example.com (see 2nd screenshot for how a successful exploitation should look like) I am interested in seeing how you guys would approach this, and hopefully learn new techniques. PS: I have changed some small details in this snippet to keep the original code confidential.

English
4
2
71
5.3K
hackermater
hackermater@hackermater11·
@intigriti the Global Search, Match & Replace (IN SCOPE) and filter using Bambdas, (also Race Conditions in Repeater ⚡👌)
English
0
0
1
95
Intigriti
Intigriti@intigriti·
what are some cool tricks/plugins within BurpSuite that have helped you find more vulnerabilities? 😎
Intigriti tweet media
English
6
9
129
10.4K
hackermater retweetledi
Intigriti
Intigriti@intigriti·
friendly reminder 🙃
Intigriti tweet media
English
12
26
251
8.2K
hackermater
hackermater@hackermater11·
I've been using Caido since (sadly) my Burp Pro license expired a week ago😂... and WOW! " I l o v e Caido ❤️. " Never have used it before and it's a really game changer 🔥. #bugbounty #bugbountytips @CaidoIO #appsec
English
0
1
2
164
hackermater
hackermater@hackermater11·
@CyberRacheal if the OTP is never stored in the server, then just intercept the response and check it and also the client-side: is a mobile app? then debug with Frida and check logcat. is a web app? use devtools.
English
0
0
1
108
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Interviewer: An OTP is valid for 60 seconds, but the server never stores it. How does it verify a code it doesn’t even 'know'?🤔
Cyber_Racheal tweet media
English
65
73
688
285.8K
hackermater retweetledi
PortSwigger
PortSwigger@PortSwigger·
Exciting news: we have teamed up with @intigriti Bug hunters can now earn a FREE 6-month Burp Suite Professional license by hitting 400 reputation points on Intigriti. More power. Deeper testing. Bigger impact. Happy hunting 🐝 #BugBounty #Intigriti #BurpSuite
PortSwigger tweet media
English
11
38
324
15.8K
hackermater
hackermater@hackermater11·
Is this for real? Yeah it is!! 😎💥 👀 DumpDork has a new version, v1.2.0 and this is huge!! This release now supports GitHub Code Search using Dorks. Hack using dumpdork from your TERMINAL without CAPTCHA limits right now! ⭐ GitHub repo: github.com/mateofumis/dum…
hackermater tweet mediahackermater tweet mediahackermater tweet media
English
0
0
4
251
hackermater
hackermater@hackermater11·
@CyberRacheal That is the case when you're inside an internal network, not the common LAN network, and this could be part of the configuration of the Router or in the worst scenario, you are under almost total network control by someone else!!😅😂..
English
0
0
1
300
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
😂 If you understand this, explain it
Cyber_Racheal tweet media
English
398
513
12.4K
11.6M
hackermater
hackermater@hackermater11·
I just learned how to perform an XSS via Host Header Injection and via Cache Poisoning (at the same time).. And.. This is a lot... !
English
0
0
0
72
Intigriti
Intigriti@intigriti·
@hackermater11 how did you manage to find the bucket in the first place? 👀
English
1
0
1
128
Intigriti
Intigriti@intigriti·
What was your first valid vulnerability? 😎
English
37
3
60
9K