l0cpd retweetledi
l0cpd
897 posts

l0cpd
@l0cpd
| Father | Bug Bounty Hunter | RECON | MMA |
Katılım Eylül 2018
1.1K Takip Edilen1.7K Takipçiler
l0cpd retweetledi

i did it again 🙏🙏
TrendAI Zero Day Initiative@thezdi
Mind blown alert 🤯! Nguyen Hoang Thach (@hi_im_d4rkn3ss) of STARLabs SG (@starlabs_sg) used a Memory Corruption bug to exploit VMware ESXi with the Cross-tenant Code Execution add-on, earning a sweeeeeet $200,000 and 20 Master of Pwn points. Full win let's go! #Pwn2Own #P2OBerlin
English
l0cpd retweetledi

Mind blown alert 🤯! Nguyen Hoang Thach (@hi_im_d4rkn3ss) of STARLabs SG (@starlabs_sg) used a Memory Corruption bug to exploit VMware ESXi with the Cross-tenant Code Execution add-on, earning a sweeeeeet $200,000 and 20 Master of Pwn points. Full win let's go! #Pwn2Own #P2OBerlin


English
l0cpd retweetledi

We got frustrated with dealing with vendor dependencies when reverse engineering large applications. @ITSecurityguard from @SLCyberSec’s Sec Research Team built Hyoktesu to solve this problem forever: github.com/assetnote/hyok… - releasing this today! Blog: slcyber.io/research-cente…
English

“How I found tricky $$$$ Server-Side Request Forgery (SSRF)” by Abdelnour Osman (DarkT) darkt.medium.com/how-i-found-tr…

English

“API Hacking for Bug Bounty: A Complete Beginner-to-Advanced Guide” by BugHunter’s Journal systemweakness.com/api-hacking-fo…

English
l0cpd retweetledi

What it actually takes to make a million in bug bounty 💸⬇
For HX007, it was... obsession, curiosity, P1-level persistence, and coming back to admin panels month after month until something finally cracked open.
If you’re grinding, stuck, or chasing your first big win, his story is the perfect proof. The Crowd has no ceiling, only momentum.
Learn how to rewrite your life through hacking: bugcrowd.com/blog/how-i-hac…

English
l0cpd retweetledi

A lot of hackers fail because they only look for bugs, not systems.
If you want to find vulnerabilities others miss, you need to model how the application works first.
Here are 5 ways to do it right 👇
1️⃣ Identify valuable target data
Start by asking: what data does the company care most about? These “treasure chests” guide your testing and threat modeling.
2️⃣ Map infrastructure layers
Break down the app into front end, middleware, and back end. Identify JavaScript frameworks (like Next.js), authentication middlewares, and where logic lives. Use browser tools and proxies to piece together the stack.
3️⃣ Assess full request flow
Don’t test endpoints blindly. Observe login flows, redirects, cookie behavior, token lifecycles, and any session creation process. Modeling how each action flows through the stack gives you exploit ideas.
4️⃣ Observe middleware behavior
Look for things like content caching, virtual host routing, API gateways, and load balancers. These layers are often misconfigured, especially when passing requests across internal services.
5️⃣ Apply context to logic
Features are rarely dangerous alone. Look at how two normal flows might interact e.g. guest checkout + account creation. That’s where logic flaws live. Combine this with known tech stack quirks to predict bugs.

English

“Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels” by Skyer @skycer_00/full-blown-ssrf-to-gain-access-to-millions-of-users-records-and-multiple-internal-panels-3719d9b802e9" target="_blank" rel="nofollow noopener">medium.com/@skycer_00/ful…

English
l0cpd retweetledi

I've included all the proven 403 bypass techniques that consistently work in real-world scenarios. After reading this write-up you won't need to refer to any other article or video on the topic anymore..i will update more things in it soon..
osintteam.blog/the-ultimate-g…
English

“Escalating Impact: Full Account Takeover in Microsoft via XSS in Login Flow” by Asem Eleraky melotover.medium.com/escalating-imp…

English
l0cpd retweetledi
l0cpd retweetledi

Writing a technical book is only a small fraction of the work. You still need:
1. Technical review
2. General editing
3. Copy editing
4. Cover designing
5. Proof reading <— I am here
“From Day Zero to Zero Day” is a way better book thanks to the amazing team at @nostarch and I can’t wait till it’s in your hands. nostarch.com/zero-day

English
l0cpd retweetledi

It's been on my TODO list for soooooooo long, but finally got my self-hosted interactsh server sorted, with file hosting.
Thanks @pdiscoveryio for the great tools! 🤘
And also a nice Burp extension github.com/wdahlenburg/in… which will be useful
English
l0cpd retweetledi

Here’s my new blog post: “Redacted bugs #3: Hunting for bugs worth $7,750 in an adult content platform.” Happy reading! securityrise.com/posts/redacted…
English

Leaking the email of any YouTube user for $10,000 brutecat.com/articles/leaki…
English






