Illex

87 posts

Illex banner
Illex

Illex

@pcuco92

Hacker 🥷 Security Researcher at @ethiack

Katılım Ocak 2018
252 Takip Edilen215 Takipçiler
Illex retweetledi
André Baptista
André Baptista@0xacb·
I keep finding GraphQL batching bugs out there. Here's how to find them 👇 Most GraphQL endpoints accept arrays of operations in a single HTTP request. So instead of sending one login request at a time (and getting rate limited after 5 attempts), you send 1000 login mutations in one request. So with a single HTTP request, you can perform 1000 password guesses. The payload might look something like this: [   {"query": "mutation { login(user:\"admin\", pass:\"password1\") { token }}"},   {"query": "mutation { login(user:\"admin\", pass:\"password2\") { token }}"},   ... ] The server processes all of them. Rate limiting usually counts HTTP requests, not operations within a request. So it sees one request and lets it through. Same trick works for brute-forcing OTPs, enumerating user accounts, or any operation where the defence depends on limiting how many times you can call it.
English
4
41
264
11.3K
Illex
Illex@pcuco92·
@LooseSecurity Without sensitive information, it can be difficult to prove impact, but this can be a starting point for reaching heap dumps
English
1
0
4
329
m0z
m0z@LooseSecurity·
@pcuco92 I've found these so many times and never felt it was worth reporting. What would the threshold be in your opinion? I typically assume unless there's cloud keys or something impactful that I can demonstrate then it's not worth it.
English
2
0
4
540
Illex
Illex@pcuco92·
The Spring Boot Actuators can expose some sensitive informations like env vars, heap dumps, configs, and internal metrics And sometimes, with simple bypass tricks we can find them: actuator/env;.. ;/actuator/env actuator;/env actuator/env%00 actuator/env; ..;/actuator/env static../actuator/env actuator/health/..;/env #bugbounty #bugbountytips #cybersecurity
English
2
38
192
9.4K
Illex
Illex@pcuco92·
Some bugs start with weird behaviors like unexpected redirects or fields that "magically" accept invalid inputs REcollapse by @0xacb uncovers the regex magic happening behind the scenes. Fuzz black-box normalizations to bypass WAFs & server-side validations 👇 #bugbountytips
English
2
0
30
1.9K
Illex
Illex@pcuco92·
7️⃣ 2FA not enforced on sensitive actions Check if actions like changing email, viewing invoices, exporting data, or adding API keys can be done after login but before completing 2FA
English
0
0
0
575
Illex
Illex@pcuco92·
Bypassing 2FA isn’t always about breaking the OTP Sometimes the weakness is in the implementation Here are a few common paths worth testing 👇 #bugbountytips #bugbountytip #bugbounty
English
8
18
216
11K
Illex
Illex@pcuco92·
6️⃣ Account linking / email change Look for flows where you can change the email, link another identity provider, or invite another account without a fresh 2FA check, then use that linked account to access or reset
English
0
0
0
600
Illex
Illex@pcuco92·
5️⃣ Third‑party login loophole If the app supports Google, Facebook, or other identity providers, log in via a compromised OAuth account and see whether 2FA is still enforced or silently skipped
English
2
0
2
818
Illex
Illex@pcuco92·
4️⃣ Pre‑2FA session abuse After signing in with valid credentials, grab any session cookie or JWT that gets issued and try using it directly on protected API endpoints before finishing 2FA
English
0
0
1
850
Illex
Illex@pcuco92·
3️⃣ Timing window exploitation During login, look for a brief state where a valid session exists before 2FA is applied, and fire a request to a sensitive endpoint in parallel to see if you can slip through
English
0
0
3
905
Illex
Illex@pcuco92·
2️⃣ Password reset shortcut Use the “forgot password” flow, set a new password, and check whether you are logged straight into the account without passing 2FA again
English
0
0
6
977
Illex
Illex@pcuco92·
1️⃣ Weak OTP throttling Review the OTP verification endpoint for missing or lax rate limiting; if it is poorly protected, a brute‑force attack against the 2FA code might be viable
English
0
0
2
1K
Illex
Illex@pcuco92·
2️⃣ Password reset shortcut Use the “forgot password” flow, set a new password, and check whether you are logged straight into the account without passing 2FA again
English
0
0
0
54
Illex
Illex@pcuco92·
1️⃣ Weak OTP throttling Review the OTP verification endpoint for missing or lax rate limiting; if it is poorly protected, a brute‑force attack against the 2FA code might be viable
English
0
0
0
41
Illex retweetledi
Valerio Brussani
Valerio Brussani@val_brux·
Yesterday, we wrapped up our Q1 @Hacker0x01 Italy vs. Portugal hacking competition with an in-person day in Porto 🇵🇹 It was a great day of hacking together and connecting with the local community. Looking forward to the next one! #BugBounty
Valerio Brussani tweet mediaValerio Brussani tweet media
English
0
7
34
2.5K
Illex retweetledi
Intigriti
Intigriti@intigriti·
Google dorking is essential when performing recon! But it can easily become a tedious process... 😓 Xnldorker by @xnl_h4ck3r gathers search results from multiple search engines simultaneously, including Google, Bing, DuckDuckGo, and more! It also features concurrent anti-bot detection and automatic result deduplication! 😎 Check it out! 👇 🔗 github.com/xnl-h4ck3r/xnl…
Intigriti tweet media
English
8
122
559
23.6K