🪲 #H2C Upgrade Bypass
Target: Applications using HTTP/2 Cleartext (h2c) upgrades.
The Core Idea: Many Web Application Firewalls (WAFs) and reverse proxies process HTTP/1.1 but fail to correctly inspect traffic after it's upgraded to HTTP/2.
How to Test:
1. Find a target that accepts an Upgrade: h2c header (common in Java, gRPC, and some reverse proxies like Nginx).
2. Send an initial HTTP/1.1 request with the upgrade header:
3. If the server agrees (responds with HTTP/1.1 101 Switching Protocols), the connection is now HTTP/2.
4. The Bypass: Craft and send malformed or smuggled HTTP/2 frames (e.g., with the :method header set to GET or POST). The downstream WAF may not parse this, allowing you to access internal endpoints or bypass security controls.
Why it works: The security boundary often only exists at the HTTP/1.1 layer. Once upgraded, your HTTP/2 traffic might be forwarded directly to the backend without inspection.
#BugBounty #Hacking #WebSecurity #WAFBypass #HTTP2
⭐️ @Zerosec_team
Target: Applications using HTTP/2 Cleartext (h2c) upgrades.
The Core Idea: Many Web Application Firewalls (WAFs) and reverse proxies process HTTP/1.1 but fail to correctly inspect traffic after it's upgraded to HTTP/2.
How to Test:
1. Find a target that accepts an Upgrade: h2c header (common in Java, gRPC, and some reverse proxies like Nginx).
2. Send an initial HTTP/1.1 request with the upgrade header:
GET / HTTP/1.1
Host: example.com
Upgrade: h2c
Connection: Upgrade
3. If the server agrees (responds with HTTP/1.1 101 Switching Protocols), the connection is now HTTP/2.
4. The Bypass: Craft and send malformed or smuggled HTTP/2 frames (e.g., with the :method header set to GET or POST). The downstream WAF may not parse this, allowing you to access internal endpoints or bypass security controls.
Why it works: The security boundary often only exists at the HTTP/1.1 layer. Once upgraded, your HTTP/2 traffic might be forwarded directly to the backend without inspection.
#BugBounty #Hacking #WebSecurity #WAFBypass #HTTP2
⭐️ @Zerosec_team
❤4
Check your burp isn't this feature is enable?
Most of hackers miss this thing. So, this is a great opportunity to make bounty using this burp feature.
#burp
#bugbounty
⭐️ @Zerosec_team
Most of hackers miss this thing. So, this is a great opportunity to make bounty using this burp feature.
#burp
#bugbounty
⭐️ @Zerosec_team
❤4🔥2
Pentesting Plugin Ecosystems: Advanced Exploitation Guide
https://www.intigriti.com/researchers/blog/hacking-tools/pentesting-addon-plugin-ecosystems
⭐️ @Zerosec_team
https://www.intigriti.com/researchers/blog/hacking-tools/pentesting-addon-plugin-ecosystems
⭐️ @Zerosec_team
❤3
The Great Firewall of China (GFW) has leaked
Good morning — around 600 GB of data has leaked. The ones to blame are Geedge Networks and the MESA Laboratory at the Institute of Information Engineering, Chinese Academy of Sciences.
These same guys, grinning slyly (like Shang Tsung), supply censorship technologies to Myanmar, Pakistan, Ethiopia, Kazakhstan, etc. (look up the “One Belt, One Road” initiative).
What leaked:
Source code, internal communication structures, work logs, technical documentation from groups involved in building and maintaining the system, plus a pile of project denoscriptions and technical proposals, and so on.
In general, if you start googling/reading about MESA and Geedge, it gets insanely interesting — not only how censorship was imposed inside China, but also how they exported it abroad for surveillance. Clever stuff.
Download :
https://cloud.proxy-bar.org/s/bOicFtWWj875DZi
⭐️ @ZeroSec_team
Good morning — around 600 GB of data has leaked. The ones to blame are Geedge Networks and the MESA Laboratory at the Institute of Information Engineering, Chinese Academy of Sciences.
These same guys, grinning slyly (like Shang Tsung), supply censorship technologies to Myanmar, Pakistan, Ethiopia, Kazakhstan, etc. (look up the “One Belt, One Road” initiative).
What leaked:
Source code, internal communication structures, work logs, technical documentation from groups involved in building and maintaining the system, plus a pile of project denoscriptions and technical proposals, and so on.
In general, if you start googling/reading about MESA and Geedge, it gets insanely interesting — not only how censorship was imposed inside China, but also how they exported it abroad for surveillance. Clever stuff.
Download :
https://cloud.proxy-bar.org/s/bOicFtWWj875DZi
⭐️ @ZeroSec_team
🔥4❤1
RadvanSec
The Great Firewall of China (GFW) has leaked Good morning — around 600 GB of data has leaked. The ones to blame are Geedge Networks and the MESA Laboratory at the Institute of Information Engineering, Chinese Academy of Sciences. These same guys, grinning…
فایروال بزرگ چین (GFW) لو رفت
صبح بخیر حدود ۶۰۰ گیگابایت داده نشت کرده. مقصرها: Geedge Networks و آزمایشگاه MESA در مؤسسه مهندسی اطلاعاتِ آکادمی علوم چین.
همین افراد با خندهای موذیانه (مثل Shang Tsung 😅) فناوریهای سانسور را به میانمار، پاکستان، اتیوپی، قزاقستان و غیره هم صادر کردهاند (کافیه ابتکار «یک کمربند، یک جاده» رو سرچ کنید).
چه چیزهایی لو رفته:
کد منبع، ساختار ارتباطات داخلی، گزارشهای کاری، مستندات فنی مربوط به گروههایی که در ساخت و نگهداری سیستم نقش داشتند، بهعلاوه کلی توضیحات پروژهها و پیشنهادهای فنی و ...
بهطور کلی اگر شروع کنید به سرچ کردن یا خوندن دربارهی MESA و Geedge، ماجرا خیلی جالب میشه نه فقط اینکه چطور سانسور رو داخل کشور اعمال میکردن، بلکه اینکه چطور این سیستمها رو برای نظارت در خارج از کشور هم صادر کردن. خیلی زیرکانه ست.
دانلود تورنت:
https://cloud.proxy-bar.org/s/bOicFtWWj875DZi
⭐️ @ZeroSec_team
صبح بخیر حدود ۶۰۰ گیگابایت داده نشت کرده. مقصرها: Geedge Networks و آزمایشگاه MESA در مؤسسه مهندسی اطلاعاتِ آکادمی علوم چین.
همین افراد با خندهای موذیانه (مثل Shang Tsung 😅) فناوریهای سانسور را به میانمار، پاکستان، اتیوپی، قزاقستان و غیره هم صادر کردهاند (کافیه ابتکار «یک کمربند، یک جاده» رو سرچ کنید).
چه چیزهایی لو رفته:
کد منبع، ساختار ارتباطات داخلی، گزارشهای کاری، مستندات فنی مربوط به گروههایی که در ساخت و نگهداری سیستم نقش داشتند، بهعلاوه کلی توضیحات پروژهها و پیشنهادهای فنی و ...
بهطور کلی اگر شروع کنید به سرچ کردن یا خوندن دربارهی MESA و Geedge، ماجرا خیلی جالب میشه نه فقط اینکه چطور سانسور رو داخل کشور اعمال میکردن، بلکه اینکه چطور این سیستمها رو برای نظارت در خارج از کشور هم صادر کردن. خیلی زیرکانه ست.
دانلود تورنت:
https://cloud.proxy-bar.org/s/bOicFtWWj875DZi
⭐️ @ZeroSec_team
🔥4❤2👍1
NodeJS_Sec_for_WebApp.pdf
2.4 MB
#Tech_book
#WebApp_Security
"Essential Node.js Security for Express Web Applications", 2023.
// This book aims to equip existing Node.js developers, both beginners and experienced, with expertise and skills in security best practices. The book takes a practical hands-on approach to the Node.js ecosystem by using a good deal of source code examples, as well as leveraging and reviewing well tested and commonly used libraries and industry security standards
⭐️ @Zerosec_team
#WebApp_Security
"Essential Node.js Security for Express Web Applications", 2023.
// This book aims to equip existing Node.js developers, both beginners and experienced, with expertise and skills in security best practices. The book takes a practical hands-on approach to the Node.js ecosystem by using a good deal of source code examples, as well as leveraging and reviewing well tested and commonly used libraries and industry security standards
⭐️ @Zerosec_team
❤3🔥1
Hi everyone, I’ve set up the watcher to run about 6 times a day, roughly every 4 hours, so you’ll get the most effective coverage possible
سلام بچه ها واچر رو تنظیم کردم روزی 6 بار ران میشه حدودا هر 4 ساعت یکبار تا بتونید موثر ترین حالت ممکن رو پوشش بدید
Watcher Report : @ZeroSec_group
⭐️ @ZeroSec_team
سلام بچه ها واچر رو تنظیم کردم روزی 6 بار ران میشه حدودا هر 4 ساعت یکبار تا بتونید موثر ترین حالت ممکن رو پوشش بدید
Watcher Report : @ZeroSec_group
⭐️ @ZeroSec_team
👍2🔥2❤1
📊 Watcher Summary Report
🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 0 new item
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item
🔗 Details: Click here
#zerosec #bugbounty #watcher #summary_report
⭐️ @ZeroSec_team
🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 0 new item
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item
🔗 Details: Click here
#zerosec #bugbounty #watcher #summary_report
⭐️ @ZeroSec_team
❤2
Daily dorking on LLMs can provide you with good bugs, especially from the data disclosures of these AI models
⭐️ @ZeroSec_team
⭐️ @ZeroSec_team
👍4🔥2❤1
📊 Watcher Summary Report
🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 90 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item
🔗 Details: Click here
#zerosec #bugbounty #watcher #summary_report
⭐️ @ZeroSec_team
🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 90 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item
🔗 Details: Click here
#zerosec #bugbounty #watcher #summary_report
⭐️ @ZeroSec_team
❤2🔥1
📊 Watcher Summary Report
🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 91 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item
🔗 Details: Click here
#zerosec #bugbounty #watcher #summary_report
⭐️ @ZeroSec_team
🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 91 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item
🔗 Details: Click here
#zerosec #bugbounty #watcher #summary_report
⭐️ @ZeroSec_team
👍1
⚡Bug Bounty Reports Extractor - CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.
✅ https://github.com/newstartlikenoneanthor-pixel/report-extractor
⭐️ @Zerosec_team
✅ https://github.com/newstartlikenoneanthor-pixel/report-extractor
⭐️ @Zerosec_team
❤1
📊 Watcher Summary Report
🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 91 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item
🔗 Details: Click here
#zerosec #bugbounty #watcher #summary_report
⭐️ @ZeroSec_team
🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 91 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item
🔗 Details: Click here
#zerosec #bugbounty #watcher #summary_report
⭐️ @ZeroSec_team
❤3😁1