Ivo de Abreu Araujo

412 posts

Ivo de Abreu Araujo banner
Ivo de Abreu Araujo

Ivo de Abreu Araujo

@ivoaabreu

Bug Hunter | Cyber Security

Katılım Ağustos 2011
293 Takip Edilen37 Takipçiler
Wesley Santos
Wesley Santos@dk4trin·
depois de ser scamado e ficar com -3 de reputation no começo de janeiro, me revoltei e consegui farmar um pouco na H1 KKKKKKKK😭😭😭 Seguimos...
Wesley Santos tweet mediaWesley Santos tweet media
Português
6
0
60
3.3K
Wesley Santos
Wesley Santos@dk4trin·
March dump: - 1 pentest (solo) + meetings @katrinasecteam - Chile trip w/ my wife - ~10k in bounties (a few collabs) Findings: - 2 IDORs (WordPress) - Symfony Debug Bypass - DOM XSS via postMessage() - KYC bypass (iGaming) - NGINX path traversal good enough for me 😆
Wesley Santos tweet mediaWesley Santos tweet mediaWesley Santos tweet mediaWesley Santos tweet media
English
8
3
121
6K
Ivo de Abreu Araujo retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
"Sensitive Information Leak & Missing Authorization via API Endpoint" Join my BugBounty Chennal: t.me/ShellSec - to find info leak bugs in wordpress use my this quick wordlist: /api/v1/export/data /api/v1/config /api/debug/env /api/v2/auth/sessions /api/v1/admin/users /wp-json/wordfence/v1/config /api/v1/billing/details /api/v1/db/stats /api/v1/logs /api/v1/health /api/v1/status /api/v1/internal/settings /api/v1/cloud/credentials /api/v1/user/profile /api/v1/system/info /api/v1/backup/list /wp-json/wp/v2/users /wp-json/wp/v2/settings /wp-json/wp/v2/media /wp-json/wp/v2/posts?status=any /wp-json/wp/v2/pages?status=private /wp-json/elementor/v1/system-info
DarkShadow tweet media
English
8
85
484
20.9K
Ivo de Abreu Araujo retweetledi
Illex
Illex@pcuco92·
Bypassing 2FA isn’t always about breaking the OTP Sometimes the weakness is in the implementation Here are a few common paths worth testing 👇 #bugbountytips #bugbountytip #bugbounty
English
8
18
214
11.2K
Ivo de Abreu Araujo retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
🔥Find critical vulnerabilities in js files✨ Looks inside this JS files: 🔍main, app, runtime, bundle, polyfills, auth, config, settings, local, dev, data, api, session, user,core, client, server, utils, base Read the full method 👇🏼 t.me/ShellSec/176
DarkShadow tweet media
English
3
38
235
12.7K
Ivo de Abreu Araujo retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
bugbounty tip: [easy to find critical bugs, follow this method] 1. find a api sensitive endpoint (must be leak sensitive info) 2. look headers "Cache-Control, CF-Cache-Status, Via, X-Cache, ETag, Age" confirm they store cache or not. (if stored try web cache deception) 3. change the HTTP request method (like: GET to POST, GET to HEAD, POST to PUT etc.) 4. if you find endpoints like: /api/users/123 use array based iDOR vulnerability (like: /api/users/123,122) don't forget to join my bugbounty telegram channel: t.me/ShellSec
DarkShadow tweet media
English
1
86
492
25.8K
Ivo de Abreu Araujo retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
Find a Business Logic Bug Exploit steps: 1. Register a new account (note the username) 2. Verify & activate it 3. Delete the account 4. Try registering again with the same username If blocked, it’s a Business Logic bug — deleted usernames shouldn't be reserved! #bugbountytips
English
5
19
190
8.4K
Ivo de Abreu Araujo retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
Sensitive info leak via google dork site:.target.com ( "date of birth" OR confidential OR "internal use only" OR "balance sheet" OR "profit and loss" OR "banking details" OR "source code" OR "national id" OR "top secret" ) (ext:pdf OR ext:doc OR ext:ppt OR ext:txt OR ext:csv)
DarkShadow tweet media
English
8
125
922
72.5K
Ivo de Abreu Araujo retweetledi
🔍mrro0o0tt
🔍mrro0o0tt@Joyerz5·
I was able to delete anyone's Bookings. But this was so tricky, not an easy IDOR! Original Req: DELETE /api/bookings?bookings=3777104 Response: Invalid Bookings = > 400 Bad Modified req: DELETE /api/bookings?bookings[]=3777104 Response: 200 OK #bugbountytips
🔍mrro0o0tt tweet media🔍mrro0o0tt tweet media
English
22
139
984
43.3K
Ivo de Abreu Araujo retweetledi
Nasser Albarrak
Nasser Albarrak@nass3r000·
When a single ID fails, a pair might pass. IDOR bypasses can be that simple 🔥 - Victim's ID: 5200 - Attacker's ID: 5233 GET /api/users/5200/info → Access Denied ❌ GET /api/users/5200,5233/info → Bypassed ✅ #bugbountytips #PenetrationTesting
Nasser Albarrak tweet mediaNasser Albarrak tweet media
English
27
101
663
65.3K