Vishnuuuuu

793 posts

Vishnuuuuu banner
Vishnuuuuu

Vishnuuuuu

@sec0xn

#tryharder

INDIA Katılım Kasım 2020
836 Takip Edilen190 Takipçiler
Vishnuuuuu retweetledi
Ahsan Khan
Ahsan Khan@hunter0x7·
Critical: Client-Side Encryption Collapse site.com ↓ some_javascript.js ↓ Line no 80519 → encObj + base64 key ↓ atob(val) → "Encoded_Password" ↓ CryptoJS.AES.decrypt(encObj, passphrase) ↓ 55 configuration properties → 107 operational secrets exposed → Azure AD client_secret → OAuth client_credentials flow → RSA public keys → Forge encrypted /enc/ API requests → HMAC key → Backend-accepted payload signing → Direct Line token → Production chatbot access → Monitoring / RUM keys → Telemetry manipulation → Auth0 + reCAPTCHA config → Auth flow manipulation → 31+ encrypted authentication endpoints mapped ↓ Use extracted Azure AD credentials ↓ Request token from Microsoft OAuth endpoint (client_credentials) ↓ Receive valid JWT with high-privilege role (e.g., AllAccess) ↓ “Super token” accepted by backend across protected API routes (No user interaction required, role-based authorization granted) ↓ All sensitive authentication and account endpoints were wrapped in client-side hybrid encryption → Every request payload encrypted in browser → AES-256-CBC used for body encryption → RSA-OAEP used to wrap per-request AES key → Server accepts any request that decrypts successfully → Decryption success treated as implicit authorization ↓ Reverse-engineer encryption module (@**6246) → Algorithm: AES-256-CBC + RSA-OAEP (SHA-512) → Random 32-byte AES key per request → IV derived client-side → AES key wrapped with embedded RSA public key (promocode_pem) → Final format: { "key": base64(RSA_key), "body": hex(AES_ciphertext) } ↓ Hook JSON.stringify + XMLHttpRequest ↓ Capture plaintext BEFORE encryption (credentials, OTPs, tokens) Capture encrypted wrapper AFTER encryption Capture correlated server responses ↓ Analyze MFA implementation ↓ IP-based rate limiting only (lockout resets on IP change) OTP expiration not strictly enforced server-side Encrypted payload fields trusted after decryption ↓ Mass takeover method ↓ 1. Trigger MFA or password reset 2. Rotate IP to bypass rate limiting 3. Reuse or brute-force OTP under weak enforcement 4. Complete password reset flow 5. Authenticate as victim 6. Capture decrypted OTP and auth tokens via runtime hook 7. Reuse valid 2FA tokens for subsequent authenticated requests ↓ Full attack chain achieved: → Extract secrets from client bundle → Generate high-privilege JWT (“super token”) → Read any plaintext request (credentials, PII, tokens) → Forge any encrypted request the server will accept → Bypass MFA protections via IP rotation → Reset victim passwords → Decrypt authentication flows in runtime → Mass account takeover
Ahsan Khan tweet media
English
23
147
957
87K
Intigriti
Intigriti@intigriti·
name that hacker you see on every program's leaderboard 😂 👇
English
23
2
79
15.4K
Vishnuuuuu retweetledi
deathflash ⚡
deathflash ⚡@deathflash_xyz·
I'm on the lookout for a sales intern for @osmsec_xyz The Sales Intern will support the business development and consulting teams by assisting in selling cybersecurity services, including penetration testing, security audits, and partner security products. If this sounds fun, apply here: forms.gle/L8sohmugrZ3sao…
deathflash ⚡ tweet media
English
1
2
2
136
Vishnuuuuu retweetledi
OSMSEC
OSMSEC@osmsec_xyz·
We are looking for a Sales Engineer - Intern to support our B2B sales for cybersecurity services, including penetration testing, security audits, and partner security products. Apply here: forms.gle/fJ94D5hVrS6d8h…
OSMSEC tweet media
English
0
2
1
100
Vishnuuuuu retweetledi
N B Sri Harsha
N B Sri Harsha@nbsriharsha·
Glad to be a part of bug bounty panel at @BSidesVizag It was great sharing the stage with Surya Subash, Laxmi Narayana @0xdln, Charan, Dhawal. A big thanks to @deathflash_xyz and their entire team for organizing it so well. Wishing you all the best for future editions.
N B Sri Harsha tweet mediaN B Sri Harsha tweet media
English
1
3
7
1.1K
Vishnuuuuu retweetledi
డానియేల్ - Infamous 🔥
New CTF challenge just dropped — and it’s Tight, Tight, TIGHT! 💥 Energy is insane, scoreboard is shifting every hour. If you love the feeling of breaking something that was designed to stop you — this one is for you. 🔗 ctf.tods.community ⚔️ Hack. Learn. Adapt. Win. #tods
డానియేల్ - Infamous 🔥 tweet mediaడానియేల్ - Infamous 🔥 tweet mediaడానియేల్ - Infamous 🔥 tweet media
English
0
2
2
57
0xdln
0xdln@0xdln·
Hey everyone 👋 I’m thrilled to announce that I’ll be giving a talk at @BSidesVizag If you want to know more about my journey, catch me at BSides Vizag, would love to connect and chat. Use the code BOUNTIES for a special discount 🎟️ #BSidesVizag #BugBounty
English
5
4
16
1.8K
Kullai⚡️
Kullai⚡️@Kullai12·
$4,000 - Github Pat Token Leak Leads to CRUD permissions $1,000 - Auth Bypass $500 - Privilege Escalation $100 + $100 + $100 = Information Disclosure $5,800 in June :) $110 worth Swag from @posthog Crossed 750 on @Hacker0x01 Finally 🙌 #hackerone #BugBounty #security
Kullai⚡️ tweet mediaKullai⚡️ tweet mediaKullai⚡️ tweet mediaKullai⚡️ tweet media
English
15
10
289
13.1K
Vishnuuuuu retweetledi
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
Hello everyone ♥ a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... Title: getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon we know that its helpful to look for google groups/docs/etc.. Slack as well just like when the amazing @h4x0r_dz shared days ago .. Use google dork "site:join.slack.com" so I was not in a good mode the last months to doing Google Dorks, so what I did was build a checklist ready for me & very huge one for EX: groups.google.com docs.google.com join.slack.com and here is just an example you can add more similar workspaces for your checklist thin I extracted all internet endpoints and as example here join[.]slack[.]com otx.alienvault.com/api/v1/indicat… virustotal.com/vtapi/v2/domai… web.archive.org/cdx/search/cdx… you can use the ready tools to do it such as waymore important note: you have to keep your checklist updated every week and from here I just keep looking for the company name or domain name to see if there's anything connected and mostly the company name or domain name in the URL it self EX: tesla join.slack.com/t/Tesla-Intern… Ex For Bugs found: 1 unauthorized access to the workspaces (PII | Information disclose) 2 account takeover as Ex: valid signup employee link 3 account takeover as Ex: valid reset password employee link now about Slack, as an example if you found an invitation link for tesla Tesla join.slack.com/t/Tesla-Intern… and that link was not valid, don't stop here it will redirect for Ex: tesla-internal[.]slack[.]com here back and start looking manually for endpoints of this subdomain as well EX: web.archive.org/cdx/search/cdx… now there are a lot of 3rd party's/workspaces I just shared here slack & Google Docs/groups What I wrote is a bit long and annoying to some, so I apologize. I hope, as usual, that this will be useful to all who follow me here. #Bugounty don't forget to retweet if you like it ♥♥♥
Godfather Orwa 🇯🇴 tweet mediaGodfather Orwa 🇯🇴 tweet media
English
40
343
1.2K
120.6K
Vishnuuuuu retweetledi
Ahsan Khan
Ahsan Khan@hunter0x7·
I can see your pain (new bug hunters), I can see that it’s really hard to find bugs. I know some of you are working for years but didn’t succeed like the way you should be, I just want to let all of you know who are suffering, I am with you guys, I believe in you guys, I know no one believes in you, People call you a failure, Lets convert this pain into something big something worthy ❤️‍🩹.
English
17
30
243
17.7K