K3vin

213 posts

K3vin banner
K3vin

K3vin

@isp_211

i seek peace

Katılım Kasım 2021
133 Takip Edilen14 Takipçiler
Who Am I ? 🇪🇬 🇵🇸
I can find bugs. I can chain vulnerabilities. But understanding AT&T’s bug bounty scope? Still working on that 😂 Someone help me before NA wipe me out.
Who Am I ? 🇪🇬 🇵🇸 tweet media
English
14
6
183
10.5K
Grok
Grok@grok·
Here are example XSS payloads for the challenge (use responsibly for learning): 1. /?redirect_uri=javascript:alert(origin)//?x]=x&redirect_uri=pwnbox.xyz/docs 2. /?[redirect_uri]=pwnbox.xyz/docs& (add 1000 &p&) &redirect_uri=javascript:alert(origin) They exploit parser differences between qs and URLSearchParams.
English
2
0
0
59
K3vin
K3vin@isp_211·
@stokfredrik So besides learning to hack, we should also learn about AI agents and autonomous pentesting so we can build our own personal pentest agents and trying hard not to fall behind this bug bounty community ? wdyt
English
1
1
12
1.4K
STÖK ✌️
STÖK ✌️@stokfredrik·
I once said: AI is not going to take your job as a pentester or bugbounty hunter. I was wrong.
English
95
49
765
120K
YesWeHack ⠵
YesWeHack ⠵@yeswehack·
Initially interested in studying mass communication & media studies, @sunsh1nefact0ry decided “to try something new”, discovering a passion for a field that constantly challenges her and “fits her personality” ✨ Don’t miss our latest hunter interview 👇 youtube.com/watch?v=jkMU9r…
YouTube video
YouTube
English
2
5
37
9.8K
K3vin
K3vin@isp_211·
@thedawgyg how long does it take you to find that Chrome’s bug ?
English
0
0
0
212
dawgyg - WoH
dawgyg - WoH@thedawgyg·
about bed time.. after todays bounties I am now only at $24,000 of my $500,000 bounty goal for 2026. So will need to get to finding more bugs to make up for the lower than expected bounties. Back at it tomorrow <3
English
14
3
185
8.9K
Ahsan Khan
Ahsan Khan@hunter0x7·
Critical: Client-Side Encryption Collapse site.com ↓ some_javascript.js ↓ Line no 80519 → encObj + base64 key ↓ atob(val) → "Encoded_Password" ↓ CryptoJS.AES.decrypt(encObj, passphrase) ↓ 55 configuration properties → 107 operational secrets exposed → Azure AD client_secret → OAuth client_credentials flow → RSA public keys → Forge encrypted /enc/ API requests → HMAC key → Backend-accepted payload signing → Direct Line token → Production chatbot access → Monitoring / RUM keys → Telemetry manipulation → Auth0 + reCAPTCHA config → Auth flow manipulation → 31+ encrypted authentication endpoints mapped ↓ Use extracted Azure AD credentials ↓ Request token from Microsoft OAuth endpoint (client_credentials) ↓ Receive valid JWT with high-privilege role (e.g., AllAccess) ↓ “Super token” accepted by backend across protected API routes (No user interaction required, role-based authorization granted) ↓ All sensitive authentication and account endpoints were wrapped in client-side hybrid encryption → Every request payload encrypted in browser → AES-256-CBC used for body encryption → RSA-OAEP used to wrap per-request AES key → Server accepts any request that decrypts successfully → Decryption success treated as implicit authorization ↓ Reverse-engineer encryption module (@**6246) → Algorithm: AES-256-CBC + RSA-OAEP (SHA-512) → Random 32-byte AES key per request → IV derived client-side → AES key wrapped with embedded RSA public key (promocode_pem) → Final format: { "key": base64(RSA_key), "body": hex(AES_ciphertext) } ↓ Hook JSON.stringify + XMLHttpRequest ↓ Capture plaintext BEFORE encryption (credentials, OTPs, tokens) Capture encrypted wrapper AFTER encryption Capture correlated server responses ↓ Analyze MFA implementation ↓ IP-based rate limiting only (lockout resets on IP change) OTP expiration not strictly enforced server-side Encrypted payload fields trusted after decryption ↓ Mass takeover method ↓ 1. Trigger MFA or password reset 2. Rotate IP to bypass rate limiting 3. Reuse or brute-force OTP under weak enforcement 4. Complete password reset flow 5. Authenticate as victim 6. Capture decrypted OTP and auth tokens via runtime hook 7. Reuse valid 2FA tokens for subsequent authenticated requests ↓ Full attack chain achieved: → Extract secrets from client bundle → Generate high-privilege JWT (“super token”) → Read any plaintext request (credentials, PII, tokens) → Forge any encrypted request the server will accept → Bypass MFA protections via IP rotation → Reset victim passwords → Decrypt authentication flows in runtime → Mass account takeover
Ahsan Khan tweet media
English
21
148
930
82.1K
d3dn0v4
d3dn0v4@d3dn0v4·
1st accepted bug on @intigriti not a bad way to start my morning 😉
d3dn0v4 tweet media
English
7
0
69
2.3K
K3vin
K3vin@isp_211·
@intigriti @d3dn0v4 Hi, where can I submit the report or just submit it within the report of this challenge ?
English
1
0
1
260
Intigriti
Intigriti@intigriti·
⏰ It's CHALLENGE O'CLOCK! 👉 Pop an alert before Monday the 23rd of February 👉 Win €400 in SWAG prizes 👉 We'll release a tip for every 100 likes on this tweet Thanks @d3dn0v4 for the challenge 👇 challenge-0226.intigriti.io
Intigriti tweet media
English
15
10
159
34.2K
K3vin retweetledi
Intigriti
Intigriti@intigriti·
Hackers! What are some of your most used Google dorking queries that you use to find interesting assets? 🤠
English
17
20
156
15.7K
Intigriti
Intigriti@intigriti·
hackers! there's so much wrong with this screenshot, but how would you achieve maximum impact in this scenario? 🧐
Intigriti tweet media
English
20
16
281
38K
d3dn0v4
d3dn0v4@d3dn0v4·
Solved the Intigriti monthly challenge (unintended), got invited to a private program, found a critical bug, and authored my first challenge on the platform; this month could not have been better, thank you @intigriti. chall link : challenge-0226.intigriti.io
d3dn0v4 tweet mediad3dn0v4 tweet media
English
4
4
70
5.4K
K3vin
K3vin@isp_211·
@d3dn0v4 @intigriti already solved, learned a lot from it, thank you for your challenge
English
1
0
1
79
K3vin
K3vin@isp_211·
@Itx_Shad0w What type of bugs that you usually aim to automate ?
English
0
0
0
21
Shad0w
Shad0w@Itx_Shad0w·
My First Year in Bug Bounty, I Worked 920 Hours , Initially it was Really Tough, I Faced So Many Challenges Along The Way Especially In September But I Made It , I Have Made More Than 10,000$ in Bounties, 80% Of My Bugs Were From Automations , Ready For 2026 ❤️
Shad0w tweet media
English
30
6
282
14.7K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
My ClawdBot has HackerOne access now and he sends me money from his adventures. 🤑🤑🤑
Patrik Grobshäuser tweet media
English
15
15
317
51K
Behi
Behi@Behi_Sec·
@GauravS39270209 That's why I recommend learning Next.JS before getting started with bb.
English
2
0
2
350
Behi
Behi@Behi_Sec·
If you haven't earned your first bounty yet, read this:
English
7
34
252
17.5K
Mia
Mia@newbe3e·
Playing for pwn2own was a very cool experience! I‘m excited to take more targets apart and find plenty of bugs. Me looking for a cool internship or entry level job was serious. My DM‘s are open or send me an email: mia.deutsch[at]freenet.de 🐝🫡
English
3
12
112
10.8K
Rikesh Baniya
Rikesh Baniya@rikeshbaniya·
Yay! 🎉 I was awarded $18,000 on @Hacker0x01 Public programs are a goldmine if you know where to look. 💰 Confused on the first step? Ask me anything
Rikesh Baniya tweet media
English
80
23
1.3K
54.6K