Electro0ne Bytes 🦅 – Telegram
Electro0ne Bytes 🦅
364 subscribers
5 photos
60 links
I publish articles related to hacking and security for you, so let's learn together.💪

Contact: @Electro0ne Blogs: electro0nes.github.io
Download Telegram
In the RESET-PASSWORD process, if the request's JSON allows adding values like an array:

{"email":["victim@test.com","attacker@test.com"]}


it could be exploited to send the reset password link/code to an attacker's email, making it easy to take over the account.
Please open Telegram to view this post
VIEW IN TELEGRAM
5
Forwarded from Brut Security
⚠️A neat trick for bypassing WAF/filters while testing for OS command injection vulnerabilities.


Use shell globbing / wildcard expansion. Here is an example

cat /e*c/p*s*d
is equivalent to cat /etc/passwd. But how?

Before cat runs, the shell expands the glob pattern /e*c/p*s*d to match actual files and directories in the filesystem.

/e*c:
The shell interprets this as "any path starting with /e, followed by zero or more characters (*), ending with c."


/p*s*d:
This matches a path or file name starting with p, followed by zero or more characters (*), then s, then zero or more characters (*), then d

Credit- Devansh Batham
Please open Telegram to view this post
VIEW IN TELEGRAM
1🔥1
ChatGPT DeepSeek
👎1👏1
Your mindset is your power.💸
Please open Telegram to view this post
VIEW IN TELEGRAM
3
Common OAuth Vulnerabilities · Doyensec's Blog

https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html
🔥3
Forwarded from Brut Security
🔖Extracting endpoints from JavaScript bookmarklets

⬇️Usage
🔴Add a new bookmark in your browser’s toolbar
🔴Replace the bookmark’s URL with the following JavaScript code:
javanoscript:(function(){var noscripts=document.getElementsByTagName("noscript"),regex=/(?<=(\"|\'|\`))\/[a-zA-Z0–9_?&=\/\-\#\.]*(?=(\"|\'|\`))/g;const results=new Set;for(var i=0;i<noscripts.length;i++){var t=noscripts[i].src;""!=t&&fetch(t).then(function(t){return t.text()}).then(function(t){var e=t.matchAll(regex);for(let r of e)results.add(r[0])}).catch(function(t){console.log("An error occurred: ",t)})}var pageContent=document.documentElement.outerHTML,matches=pageContent.matchAll(regex);for(const match of matches)results.add(match[0]);function writeResults(){results.forEach(function(t){document.write(t+"<br>")})}setTimeout(writeResults,3e3);})();

🔴Visit the target page and click the bookmarklet. The noscript will run in your browser, revealing previously undiscovered endpoints right on the page.
Please open Telegram to view this post
VIEW IN TELEGRAM
3👍2