Niraj Dhalani

449 posts

Niraj Dhalani banner
Niraj Dhalani

Niraj Dhalani

@niraj_dhalani

🖥👨‍💻Computer Engineer | Security Consultant

Katılım Kasım 2014
693 Takip Edilen175 Takipçiler
Niraj Dhalani retweetledi
Aditya
Aditya@ADITYASHENDE17·
Recon Smarter: Finding Sensitive Files in Large URL Lists Most bug hunters stop at URLs. Real impact comes from what those URLs expose. This workflow combines: • high-risk file extensions • real-world secret patterns • automated URL discovery Result → fewer URLs, higher signal, better findings. Step 1: Asset discovery subfinder -d domains.com | httpx -mc 200,401,403,404 | tee domains.txt Step 2 URL extraction cat domains.txt | katana | tee urls.txt Step 3: Smart grep (FILES + SECRETS) We combine: • Sensitive file extensions • High-signal secret regex cat urls.txt | grep -aiE "\.(zip|rar|tar|gz|config|log|bak|backup|java|old|xlsx|json|pdf|doc|docx|pptx|csv|htaccess|7z)$|(?i)(?:(?:access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_.,-]{0,25})[:<>=|]{1,2}.{0,5}['\"]([0-9A-Za-z\-_=]{8,64})['\"]" #bugbounty #recon #infosec #cybersecurity #pentesting #websecurity #hacking
Aditya tweet media
English
13
96
461
19.4K
Niraj Dhalani
Niraj Dhalani@niraj_dhalani·
@Xuser0_0 @Xuser0_0 which commands did you use for perform following actions: - Introspect the database schema - Query sensitive user data, including: - Email addresses - Phone numbers - Names - IDs
English
1
0
0
17
Chanti
Chanti@Xuser0_0·
Seeking Advice from the Community! As a security researcher, I recently discovered an exposed AWS AppSync GraphQL endpoint and API key in a public JS file. Using the endpoint and API key, I was able to: - Introspect the database schema - Query sensitive user data, including: - Email addresses - Phone numbers - Names - IDs After reporting the issue to the client, they removed the file but failed to address the root cause - multiple JS files still contain the exposed credentials. What's more concerning is that despite my responsible disclosure, the client hasn't acknowledged or rewarded my efforts, citing they're a small startup. Meanwhile, they're generating revenue by selling services to customers. I'm considering escalating this matter to the UK ICO under GDPR regulations. Have any of you encountered similar situations? What steps would you recommend taking next? Should I: 1. Continue to work with the client to ensure thorough remediation? 2. Escalate the issue to the UK ICO immediately? 3. Document everything and potentially publish a responsible disclosure? *Poll: What's Your Next Step?* A) Continue working with the client B) Escalate to UK ICO C) Document and publish responsible disclosure D) Other (share in comments) The lack of recognition for security researchers' efforts is a concerning trend. Let's discuss! #Cybersecurity #GDPR #ResponsibleDisclosure #SecurityResearch #DataProtection #Infosec #StartupSecurity #EthicalHacking
English
1
0
0
203
Ahsan Khan
Ahsan Khan@hunter0x7·
@Bugcrowd @Hacker0x01 Why not hire people like who have seen the struggle of real hunting? Why not hire people who are working day/night for years, These people are Gems, They know what are the real problems and how to overcome them. Hire bug hunters instead of Pentesters, Hire talent instead of certs, Hire those who would love to build the platform. 90% reports goes to N/A because Triagers (Pentesters) couldn't understand it. 5% goes to invalid priorities. 4% goes to no response. 1% goes to accepted because ur lucky that time. There were times when triagers (Bug hunters) help hunters to exploit their submissions to escalate the priority (Bug hunters). vs We don't have time to check your report, Kindly create a video because it takes time to create a new user (Pentesters).
English
34
52
299
35.8K
Priya Purohit
Priya Purohit@Priyaa_Purohit·
How much should Nirmala Sitharaman be rated on 0-10for her work as Finance Minister ?
Priya Purohit tweet media
English
3.6K
167
1.1K
173.8K
todayisnew
todayisnew@codecancare·
@theSpaghettiSec @Hacker0x01 Thanks for the kind words :) and the collabs from you and all others to reach the milestone :) hope everyone can find some peace in there own way over this holiday season :)
English
4
2
98
4.7K
Marco (@jmo740)
Marco (@jmo740)@jmo740·
Congratulations @codecancare The king of automation has reached over 200,000 reputation points on @Hacker0x01 🔥 Eric you are doing a great job 🪲
Marco (@jmo740) tweet mediaMarco (@jmo740) tweet media
English
5
6
258
38K
Niraj Dhalani
Niraj Dhalani@niraj_dhalani·
@ThisIsDK999 Hi @ThisIsDK999 nice thread btw could you give some insights like how you are finding this groovy console like are you using some tool to find these type of panels and other aem related things
English
0
0
0
49
Debangshu 🇮🇳🥷
Debangshu 🇮🇳🥷@ThisIsDK999·
x.com/ThisIsDK999/st… Here's the thread on how to achieve RCE via GroovyConsole in AEM even with a heavy dispatcher configuration!
Debangshu 🇮🇳🥷@ThisIsDK999

Just gained RCE on an AEM web server (real world) by exploiting GroovyConsole and an exceptional bounty! In @intigriti ! If you too, want to do super cool hax0r things such as hacking real-world web apps, use my link and sign up today! login.intigriti.com/account/regist… 🧵...(1/n)

English
2
15
67
5.4K
Niraj Dhalani
Niraj Dhalani@niraj_dhalani·
@bug_vs_me You are lucky as this iframe issue i found in another program but bounty 200$
English
0
0
0
12
Ahmed Ehab
Ahmed Ehab@HeBo117·
lol He thought that the community will forget his scam
Ahmed Ehab tweet media
English
14
6
92
30.8K
Fadi Al-Aswadi
Fadi Al-Aswadi@f_aswadi·
هل يمكنك كسر الباسورد؟
Fadi Al-Aswadi tweet media
العربية
27
3
50
24.8K