Forwarded from Electro0ne Bytes 🦅 (ᴍͥᴏᴇͣɪͫɴ)
Think like a developer, act like an attacker. Study how applications are built before you try to break them. Understanding architecture, common frameworks, authentication flows, and data handling patterns will give you a huge edge. Don’t chase bugs randomly — build hypotheses, validate them, and go deep. And most importantly, document everything. A disciplined hacker is a dangerous one. 😡 😎
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥12 4❤3
گایز طبق تجربه کوچیکم یه چیزی میگم:
بعضی وقتا یه باگ پیدا میکنین مثلا unpredictable idor
و سریع میرین گزارش میدین اشتباهه
اگر باگ رو به سختی پیدا کردین صبرکنین و برین راهی برای predictable کردنش پیدا کنین
من واسه 2 باگ، چند ماه صبر کردم و نتیجه شو گرفتم
الانم دقیقا ۲ تا دارم که برم گزارش بدم مدیوم میشن
ولی گذاشتم یه گوشه هر بار میرم یه سیخی میزنم شاید تونستم impact رو بیشتر کنم
یه تایمی براش تعیین کردم، بعدش نشد سریع گزارش میدم
بعضی وقتا یه باگ پیدا میکنین مثلا unpredictable idor
و سریع میرین گزارش میدین اشتباهه
اگر باگ رو به سختی پیدا کردین صبرکنین و برین راهی برای predictable کردنش پیدا کنین
من واسه 2 باگ، چند ماه صبر کردم و نتیجه شو گرفتم
الانم دقیقا ۲ تا دارم که برم گزارش بدم مدیوم میشن
ولی گذاشتم یه گوشه هر بار میرم یه سیخی میزنم شاید تونستم impact رو بیشتر کنم
یه تایمی براش تعیین کردم، بعدش نشد سریع گزارش میدم
❤25
Forwarded from Electro0ne Bytes 🦅 (ᴍͥᴏᴇͣɪͫɴ)
Here I will tell you a few things that will affect you in the bug bounty.
Mindset🧠
Sometimes it doesn't catch you for a few days, but you still find a valuable bug.
By pushing too hard when your brain is tired, the quality of your work will decrease. Rest is part of the process.
Someone who got a bug today might have been a zero last week.
In Hunting🉐
Map out the architecture, APIs, auth flow, user roles, etc.
Strange inputs, unusual usage patterns, or borderline behaviors.
automate the web application changes or when a subdomain get http service up
Updates may create new auth bypass, XSS, or misconfig.
Mindset
Be patient, not desperate
Sometimes it doesn't catch you for a few days, but you still find a valuable bug.
Avoid burnout
By pushing too hard when your brain is tired, the quality of your work will decrease. Rest is part of the process.
Compare with yourself, not others
Someone who got a bug today might have been a zero last week.
In Hunting
Know the app inside out
Map out the architecture, APIs, auth flow, user roles, etc.
Always test edge cases
Strange inputs, unusual usage patterns, or borderline behaviors.
Automate the boring parts
automate the web application changes or when a subdomain get http service up
Re-test old stuff after updates
Updates may create new auth bypass, XSS, or misconfig.
Please open Telegram to view this post
VIEW IN TELEGRAM
alert XSS PoC with limits1) without spaces and quotes
parent[/al/.source+/ert/.source](1)
2) without spaces, quotes, + sign
parent[/al/.source.concat(/ert/.source)](2)
👍9❤1
Forwarded from Electro0ne Bytes 🦅 (ᴍͥᴏᴇͣɪͫɴ)
There are many places to fuzz in an HTTP request, but there’s one often-overlooked spot that’s actually very promising. Check out this URL:
redacted[.]com/index.php?mode=show&q=meydi
Most people focus on fuzzing parameters and paths — and yes, that’s always necessary. But one smart approach is value fuzzing, especially when changing a single value can significantly alter the response.
For example, take this:
redacted[.]com/index.php?mode=FUZZ&q=meydi
Here, fuzzing the mode parameter can lead to interesting behavior. It’s a great spot to test for hidden functionalities
📱 Link
redacted[.]com/index.php?mode=show&q=meydi
Most people focus on fuzzing parameters and paths — and yes, that’s always necessary. But one smart approach is value fuzzing, especially when changing a single value can significantly alter the response.
For example, take this:
redacted[.]com/index.php?mode=FUZZ&q=meydi
Here, fuzzing the mode parameter can lead to interesting behavior. It’s a great spot to test for hidden functionalities
Please open Telegram to view this post
VIEW IN TELEGRAM
👍11❤3
Forwarded from APPSeX
X (formerly Twitter)
Sky Desperados (@jusxing) on X
I found an interesting vulnerability and wanted to share a brief summary:
There’s an endpoint that uses a unique ID in the URL (/example/123) and binds that ID to the user's PHP session cookie
After the binding, the server responds with a 302 redirect and…
There’s an endpoint that uses a unique ID in the URL (/example/123) and binds that ID to the user's PHP session cookie
After the binding, the server responds with a 302 redirect and…
❤1
I was writing a "Security in JavaScript" book, that I explained how you can make an advance XSS payload like this one:
https://x.com/hoseinshurabi/status/1941905813041201247
[...{[Symbol.iterator]:\u0061lert.bind(null,'catfather')}]https://x.com/hoseinshurabi/status/1941905813041201247
❤1 1 1
BugBounty & Hacking Resources
https://jorianwoltjer.com/blog/p/research/nonce-csp-bypass-using-disk-cache
اینو چند نفر تونستن متوجه بشن میخوام یه آمار بگیرم؟
Anonymous Poll
20%
کامل متوجه شدم🤯
15%
بیشترشو فهمیدم🧐
39%
سخت بود🧐
26%
علاقه ای به کلاینت ساید ندارم🤔
❤2 1
These vendors are making our job harder and harder
https://x.com/garethheyes/status/1943258793883648450?s=46
https://x.com/garethheyes/status/1943258793883648450?s=46
X (formerly Twitter)
Gareth Heyes \u2028 (@garethheyes) on X
These vendors are making our job harder and harder
❤1
BugBounty & Hacking Resources
These vendors are making our job harder and harder https://x.com/garethheyes/status/1943258793883648450?s=46
توی نسخه جدید Firefox Nightly، یه تکنیک مخرب به اسم DOM Clobbering بگا رفت!
💡 قبل از این تغییر، اگه یه المنت HTML مثل 😬
اما حالا:
دیگه نمیتونی با name یا id، ویژگیهای داخلی document رو بازنویسی کنی (مثل document.currentScript, document.forms, document.location و غیره)
<img name="currentScript">توی صفحه میذاشتی، میتونست مقدار
document.currentScriptرو خراب کنی یعنی مرورگر به جای اینکه به <noscript> واقعی اشاره کنه، اون img رو نشون میداد
اما حالا:
دیگه نمیتونی با name یا id، ویژگیهای داخلی document رو بازنویسی کنی (مثل document.currentScript, document.forms, document.location و غیره)
<img src=a name=currentScript>
<noscript>
alert(document.currentScript)
</noscript>
Please open Telegram to view this post
VIEW IN TELEGRAM