Mohsin Khan

8.8K posts

Mohsin Khan banner
Mohsin Khan

Mohsin Khan

@tabaahi_

25 | Bug Bounty Hunter & Pentester

Katılım Mart 2021
398 Takip Edilen19K Takipçiler
Mohsin Khan retweetledi
the_IDORminator
the_IDORminator@the_IDORminator·
I spent ~6 hours yesterday working on a target. If you check my recent post about "Step 1", I was on part "D". I found 3 distinct P1s, one of which probably could have been broken down into 8 specific BAC issues but that sounded like too much work. Issue 1: LFI/traversal As I mentioned, this was found by searching all of my recon files (batch GAU outputs) for "filename=", then tinkering with any of them that looked susceptible. This was literally a one-liner in a GAU file, that could have been easily overlooked because the stem of the URI path actually ended in .PDF, which turned out to have no impact on the URI param itself. Probably why it was missed in the past. So it looked like /app/filename.pdf?filename=test.pdf; but /app?filename=test.pdf still brought the file back, and the LFI was in the filename param. Issue 2: Account Takeover After self registering on a site, I was able to find a section that lets you "invite a user" to your team, and assign a role like admin. However, the payload didn't check the team integer belonged to me, so I could invite myself via email as an administrator to any team in the system, granting full access. Oops. This was an IDOR in a POST JSON body. You find this stuff by using the software and interacting with it. Issue 3: Privilege Escalation BAC After self registering for a site, I dumped all of the API paths from any JS I could find. I made sure to remove any that said logout or logoff. I do this so my session isn't logged off while testing. I then hit them all in intruder with my authenticated session, and noted those which did not 403 or 302 redirect to the logoff or logon page (indicating no access). I then assessed each request that had a 200, and noted ~8 administrative pages that had read/write access to important functions and PII. In summary, no I do not think bounty has gotten any harder, looks like the same game. That was about a $2500/HR hunting spree assuming no duplicates and what not. AI is a capable tool now for hunting, but it will be a long time if ever before it effects the bug count on the internet at large. That said, I hear actually getting triaged and paid may be a different matter these days 🤣 How did AI help? AI was able to very quickly help me find LFI paths given the architecture/stack to dump important files AFTER discovering the bug. This would have been more difficult in the past. I use it for very specific tasks to speed things along, help with payloads, parse JS, and things of that nature... when needed. Its not the first thing I turn to.
English
9
22
208
5K
Mohsin Khan retweetledi
def1ant
def1ant@0xdef1ant·
the duality of Claude
def1ant tweet mediadef1ant tweet media
English
4
3
70
7.8K
Mohsin Khan retweetledi
def1ant
def1ant@0xdef1ant·
when claude hits you with the "🎯🎯🎯 MASSIVE" and the "🎉🎉🎉 CRITICAL", you know the results are going to be disappointing
English
0
1
3
534
Mohsin Khan
Mohsin Khan@tabaahi_·
Which one is actually better: Claude AI or Codex?
English
1
0
1
1.8K
Paraguin
Paraguin@Paraguin58·
Tried magnesium glycinate and literally woke up screaming because i had a dream that the little green wrestler dude from Peacemaker broke into my house and attacked me. Honestly 10/10 would recommend
Mohsin Khan@tabaahi_

I recently tried magnesium glycinate and zinc, and bro… I slept for 8 hours but woke up feeling like I’d been on sleeping for 8 days. I even remembered my dreams in 4K for the first time ever. What is this magnesium some kind of premium sleep subscription?

English
1
0
1
392
Arth Bajpai 🇮🇳
Arth Bajpai 🇮🇳@arth_bajpai·
So many scammers in bug bounty nowadays Reported bug 6 months ago on a fresh invite, no activity now marked informational saying endpoint being decommissioned and no fixes Whereas bug is fixed and endpoint is still alive #uniqe_scam i might post more of these scams in future
English
3
1
28
1.9K
Mohsin Khan retweetledi
Geekboy
Geekboy@emgeekboy·
Bug bounty and AI-generated reports are scaling faster than any team can triage manually. Most read like real vulns now -- the only way to know is to actually reproduce them. Triage does exactly that. Reproduces every report in an isolated sandbox, confirms exploitability with real evidence, and filter the noise automatically. Works with HackerOne, Bugcrowd, Claude Code reports. projectdiscovery.io/triage
English
5
7
127
11K
Mohsin Khan retweetledi
Yassine Aboukir 🐐
Yassine Aboukir 🐐@Yassineaboukir·
If you’re a good bug bounty researcher, AI amplifies your skills. If you lack the foundations, you just become a victim of slop, and so do the programs you hack. Applies to all other fields.
English
8
31
331
12.4K
Chutki Chaiwali🇮🇳
Chutki Chaiwali🇮🇳@Chai_Angelic·
This is Poverty .. It doesn't even see the age 🥹
English
37
456
2.7K
24.8K
Mohsin Khan retweetledi
Nagli
Nagli@galnagli·
One critical a day keeps the doctor away
Nagli tweet media
English
18
7
240
18.5K
Mohsin Khan retweetledi
The Shift Journal
The Shift Journal@TheShiftJournal·
Telegram CEO explains why he never had depression.
English
64
2.1K
14.4K
889.4K
Mohsin Khan
Mohsin Khan@tabaahi_·
@SaiAnvii Itna to time lag hi jata hai yr job preparation krne me. Itna to chalta hai 🙂
Filipino
2
0
6
370
Mohsin Khan retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
POV: you are downloading npm packages in 2026
English
65
818
10.7K
570.6K