HackingHub

3.2K posts

HackingHub banner
HackingHub

HackingHub

@hackinghub_io

Educating the next generation of ethical hackers.

United Kingdom Katılım Nisan 2019
14 Takip Edilen12.5K Takipçiler
HackingHub
HackingHub@hackinghub_io·
I was recently hunting for IDOR in a web app, but couldn't find IDs anywhere. The app just used session tokens. Eventually I found it, the "unsibscribe" link! 3rd party and microservices often process data using a raw database ID. It pays to sign up to newsletters!
English
0
2
29
1K
HackingHub
HackingHub@hackinghub_io·
Obviously a SQLi vuln. 💉 But what does your payload look like? What's your process from here?
HackingHub tweet media
English
0
0
8
609
HackingHub
HackingHub@hackinghub_io·
This will search the indexed Postman pages. If the docs exist, look for Authorization: Bearer, x-api-key, or client_secret. You will frequently find live production tokens hardcoded in the example requests. Use different search engines to have reliable results.
English
0
0
6
487
HackingHub
HackingHub@hackinghub_io·
Postman’s "Publish Document" feature defaults to keeping environment variables if they are saved in the active scope.  These get indexed by Google. ✅Try dorking: site:documenter.getpostman.com "targetapp[.]com"
English
1
1
8
542
HackingHub
HackingHub@hackinghub_io·
You're mapping the main API of your target, but hit a wall due to authentication. You’re thinking of brute-forcing the API. But what if a dev published the API docs for a contractor and forgot to remove the Authorization headers or environment variables? 👇🧵
English
1
7
48
2.3K
HackingHub
HackingHub@hackinghub_io·
That’s the magic of trailing slash. 🪄 Want to practice your hacking techniques on real-world scenarios? Totally FREE! 👇 hhub.io/eSLRYyLUEV
English
0
0
1
314
HackingHub
HackingHub@hackinghub_io·
What may have happened: The security rule protected /api/v1/users strictly, but the controller still accepted /api/v1/users/. The request reached the same controller through a path the security rule did not cover correctly.
English
1
0
0
311
HackingHub
HackingHub@hackinghub_io·
Are you testing a Java Spring Boot app that uses RBAC to protect API endpoints? Spring Security may use AntPathRequestMatcher for access rules. If the rules are written too strictly like locking down /api/v1/users but not /api/v1/users/ an authorization mismatch can happen 👇🧵
English
2
7
43
2.7K
HackingHub
HackingHub@hackinghub_io·
The depth of your assumptions and the persistence of your efforts determine your skill ceiling 🕶️
HackingHub tweet media
English
0
4
29
794
HackingHub
HackingHub@hackinghub_io·
Don't get stuck in the "massive subdomain" trap 👇
English
0
0
17
897
HackingHub
HackingHub@hackinghub_io·
"Where do I start with Bug Bounty? Where do I actually sign up and register?" It’s the most frequent question we receive from the community. Here is the answer👇
English
0
5
48
2.2K
HackingHub
HackingHub@hackinghub_io·
If you're a bug bounty hunter or you want to become one, watch this. Here are 3 tips from @nahamsec on what you should be doing right now 👇
English
0
4
50
1.3K
HackingHub
HackingHub@hackinghub_io·
The gateway may see this request under your authorized path and allow it. The backend then normalizes the traversal and routes to the victim’s directory. This only works if there’s a normalization mismatch between layers. That’s a broken access control. ⛓️‍💥
English
1
0
2
543
HackingHub
HackingHub@hackinghub_io·
API gateway path normalization abuse. Gateways and backend APIs may normalize URL paths (like .. ; %2f) differently. For example, a gateway might evaluate the raw path, while the origin server decodes it (%2f → /) and resolves it, changing the final route.
English
1
7
38
3.5K
HackingHub
HackingHub@hackinghub_io·
Join our Regex for Hackers course and level up your pattern recognition now 👇 hhub.io/Regex
English
0
0
0
216
HackingHub
HackingHub@hackinghub_io·
Let's be honest: the cat's version has more character. Literally 🕶️.
HackingHub tweet media
English
1
0
17
762