BePractical – Telegram
BePractical
7.4K subscribers
232 photos
24 videos
6 files
395 links
If you have any doubts then email at faiyazahmad.online@gmail.com
Download Telegram
Once you have solved this challenge, please write a small writeup and send it to business@bepractical.tech

The people who will be able to solve both of these challenge will receive a shoutout in the upcoming video!

Challenge ends in 10 hrs
How many of you are trying to solve these challenges?
Anonymous Poll
59%
Me
41%
Not Me
👍62😁1
Hi everyone, The solution for task two is not on main.bepractical.tech
Actually that subdomain was used as a subdomain takeover lab and some participant have exploited it & uploaded the same webpage given as the challenge. We have removed every lab's dns record for now. The time duration for this challenge is now also increased to 24 hrs. ( It will expire on 1st July 2024 at 7pm IST)

Currently no one is able to find the solution for task 2!
2
Hint: It is a reconnaissance challenge so please don't focus on finding or exploiting any vulnerabilities!
😁3
Hint 2: It is not related to content discovery 😉
😁3
So far, no one is able to solve the second challenge! The challenge will end at 7:00pm IST
👍4😁1
Congratulations Mehraj for solving both of the challenges🥳🥳🥳
👏7
The challenge has been ended now! (Only three people were able to solve both of the challenges)
Congrats to Mehraj, Abhisekh and Akshit for successfully solving the challegnge!🥳🥳🥳
Media is too big
VIEW IN TELEGRAM
Here is the solution for both of the challenges!

We will be conducting a web recon workshop again for beginner-intermediate bug bounty hunters where you will learn how to dive deep into the target in this month! Stay Tuned
11👍2
In a recent penetration testing engagement, I was able to find an api endpoint which was disclosing every user's information present on the web page without any authentication!!

Here's what i did:
1. Used ffuf with valid cookies and headers to enumerate the content.
2. After the discovery of this endpoint, I simply remove the required cookies & headers.
3. I was still able to fetch the data!

As always, a proper reconnaissance is necessary to uncover interesting vulnerabilities!
22🔥6👍2
Finally we have completed our first workshop i.e Web Reconnaissance! I really hope that all our participants have learned something new & interesting that will help you all to upskill your recon game! Keep Hacking Everyone🤖
🥰9👍51
New Batch for this same workshop will be releasing soon this month! Stay Tuned❤️
7👍1
New video will be releasing within an hr!
👍74
Today i spent most of my time in crafting a payload that can bypass cloudflare and finally got one! I immediately tested the payload on few websites that were protected by cloudflare and successfully got the xss triggered!!!!

Reported this issue to the bug bounty program! Hoping for the best
29🔥12👍5👎1
I will release a video on it very soon!
20🔥2
Media is too big
VIEW IN TELEGRAM
Here's the xss payload: <button%20popovertarget=x>Click%20me</button><img%20onbeforetoggle=alert(1)%20popover%20id=x>XSS

For those who were asking me how i created this, I actually used the same method discussed in this video: https://www.youtube.com/watch?v=4_VbPem6gxI
14🔥7👍2
Hi everyone, We are excited to announce the second batch for web reconnaissance workshop!


If you are a beginner or someone who wants to upskill your recon game then this workshop is for you! Throughout these 7 days, we will explore various methods & techniques that will not only help you to get the basics but also it will help you in creating your own methodology!

You can use the link below to register into this workshop
-------------------------
For People Living In India:
Link: https://pages.razorpay.com/bepracticalWorkshop
--------------------------
For People Outside India:
Link:

https://pages.razorpay.com/bepracticalInternational

[Please make sure to Pay Using PayPal Only]
--------------------------

Last Date Of Registration: 15th July 2024

Looking forward to see you all in this workshop!!!
👍113
This was the feedback of previous workshop on reconnaissance. We are really grateful that those who enrolled into the session got to learn something new/interesting and were able to improve their recon game!🎉
👍53👎1
Media is too big
VIEW IN TELEGRAM
Hey everyone,

I'm thrilled and deeply grateful for the incredible response to our first web reconnaissance workshop! Your enthusiasm and feedback were amazing, and it's clear that many of you are eager to enhance your bug bounty hunting and penetration testing skills.

Due to high demand and many not being able to join the first batch, I'm excited to announce another round of the workshop! This is your chance to dive deep into web reconnaissance, learn practical techniques, and connect with a passionate community.

Why Join This Workshop?

-> Full Practical Session
-> Live Q&A session
-> Demo On Real Target

I genuinely appreciate your support and interest. Let’s continue this journey together and take our skills to the next level!

Reserve Your Spot Now:

India: https://rzp.io/l/bepracticalWorkshop
Other Countries: https://rzp.io/l/bepracticalInternational
Thank you once again for your love and support. Let’s make this second batch even more amazing!

Stay curious and keep hacking,
👍841