iOS Hacking - A Beginner's Guide to Hacking iOS Apps [2022 Edition]
https://martabyte.github.io/ios/hacking/2022/03/13/ios-hacking-en.html
https://martabyte.github.io/ios/hacking/2022/03/13/ios-hacking-en.html
martabyte
iOS Hacking - A Beginner’s Guide to Hacking iOS Apps [2022 Edition]
My first post will be about iOS Hacking, a topic I’m currently working on, so this will be a kind of gathering of all information I have found in my research. It must be noted that I won’t be using any MacOS tools, since the computer used for this task will…
👍4
👍19🔥10👏6👎1
FINDING GADGETS LIKE IT'S 2022
https://www.synacktiv.com/publications/finding-gadgets-like-its-2022.html
https://www.synacktiv.com/publications/finding-gadgets-like-its-2022.html
Synacktiv
Finding gadgets like it's 2022
👍4
Achieving Remote Code Execution via Unrestricted File Upload
https://medium.com/@haroonhameed_76621/achieving-remote-code-execution-via-unrestricted-file-upload-6050f360c218
https://medium.com/@haroonhameed_76621/achieving-remote-code-execution-via-unrestricted-file-upload-6050f360c218
Medium
Achieving Remote Code Execution via Unrestricted File Upload
$whoami:
👍11
Bug Bytes #163 – Uber Eats payment bypass, Mystery lab challenge & 1337Up livestream
https://blog.intigriti.com/2022/03/16/bug-bytes-163-uber-eats-payment-bypass-mystery-lab-challenge-1337up-livestream/
https://blog.intigriti.com/2022/03/16/bug-bytes-163-uber-eats-payment-bypass-mystery-lab-challenge-1337up-livestream/
Intigriti
Bug Bytes #163 - Uber Eats payment bypass, Mystery lab challenge & 1337Up livestream
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comp...
How I was able to find 50+ Cross-site noscripting (XSS) Security Vulnerabilities on Bugcrowd Public Program?
https://infosecwriteups.com/how-i-was-able-to-find-50-cross-site-noscripting-xss-security-vulnerabilities-on-bugcrowd-public-ba33db2b0ab1
https://infosecwriteups.com/how-i-was-able-to-find-50-cross-site-noscripting-xss-security-vulnerabilities-on-bugcrowd-public-ba33db2b0ab1
Medium
How I was able to find 50+ Cross-site noscripting (XSS) Security Vulnerabilities on Bugcrowd Public…
Hello everyone, I hope by the grace of God everyone who is reading this blog post is doing well and their families during this pandemic…
🔥9👍8
Bug Bounty Redacted #1: Exposed Redis and HAProxy https://www.youtube.com/watch?v=mWNaGn8xwoc
YouTube
Bug Bounty Redacted #1: Exposed Redis and HAProxy
Welcome to our new series called Bug Bounty Redacted! In this series we will be going through reports we have submitted to bug bounty programs over the last five years.
This video series will progress in difficulty, with each episode covering some reports…
This video series will progress in difficulty, with each episode covering some reports…
👍3
🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
GitHub
GitHub - Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera…
🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337 - Puliczek/CVE-2022-0337-PoC-Google-Chrom...
👍6
Unraveling Assets from Android Apps at Scale
https://bevigil.com/blog/unraveling-assets-from-android-apps-at-scale/
https://bevigil.com/blog/unraveling-assets-from-android-apps-at-scale/
BeVigil Blog
Unraveling Assets from Android Apps at Scale - BeVigil Blog
Over the years, large-scale scanning of the internet has enabled the security community to identify widespread vulnerabilities and mitigate them before they can be exploited.
🔥1
Arbitrary file read via the bulk imports UploadsPipeline https://hackerone.com/reports/1439593
HackerOne
GitLab disclosed on HackerOne: Arbitrary file read via the bulk...
### Summary
The bulk imports api does not remove symlinks when untaring the uploads.tar.gz file, allowing arbitrary files to be read and uploaded when importing a group.
When a group has uploads...
The bulk imports api does not remove symlinks when untaring the uploads.tar.gz file, allowing arbitrary files to be read and uploaded when importing a group.
When a group has uploads...
👍1
High Risk Vulnerability Disclosed to Ondo Finance
https://iosiro.com/blog/high-risk-vulnerability-disclosed-to-ondo-finance
https://iosiro.com/blog/high-risk-vulnerability-disclosed-to-ondo-finance
Iosiro
High Risk Vulnerability Disclosed to Ondo Finance | iosiro
A high risk vulnerability was disclosed to Ondo Finance by iosiro affecting the Tranche Token smart contract and surrounding contracts and awarded with a $25,000 bounty.
❤6👍4
How I Was Able To TakeOver Any Account On One Of Europe's Largest Media Companies
https://medium.com/@tobydavenn/how-i-was-able-to-takeover-any-account-on-one-of-europes-largest-media-companies-e8d25e59c08
https://medium.com/@tobydavenn/how-i-was-able-to-takeover-any-account-on-one-of-europes-largest-media-companies-e8d25e59c08
👍7😁1
Bug Bytes #164 – New Collaborator domain, BITB attack & XSS to RCE on an almost static site https://blog.intigriti.com/2022/03/23/bug-bytes-164-new-collaborator-domain-bitb-attack-xss-to-rce-on-an-almost-static-site/
Intigriti
Bug Bytes #164 - New Collaborator domain, BITB attack & XSS to RCE on an almost static site
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The first series is curated by Mariem, better known as PentesterLand. Every week, she keeps us up to date with a comp...
👍5
Leaked Credentials gives access to internalfb.com
https://philippeharewood.com/leaked-credentials-gives-access-to-internalfb-com/
https://philippeharewood.com/leaked-credentials-gives-access-to-internalfb-com/
These aren't the access_tokens you're looking for
Leaked Credentials gives access to internalfb.com - These aren't the access_tokens you're looking for
Facebook uses a contracting company in Someplace called Something to test new and upcoming features across the Facebook family. This company uses real Facebook and Instagram profiles to test in public. A certain trivially found “flag” allows one to identify…
ZKar is a Java serialization protocol analysis tool implement in Go. https://github.com/phith0n/zkar
GitHub
GitHub - phith0n/zkar: ZKar is a Java serialization protocol analysis tool implement in Go.
ZKar is a Java serialization protocol analysis tool implement in Go. - phith0n/zkar
👍9
Ultimate Reconnaissance RoadMap for Bug Bounty Hunters & Pentesters https://ahmdhalabi.medium.com/ultimate-reconnaissance-roadmap-for-bug-bounty-hunters-pentesters-507c9a5374d
Medium
Ultimate Reconnaissance RoadMap for Bug Bounty Hunters & Pentesters
Advanced Reconnaissance and Web Application Discovery RoadMap to Find Massive Vulnerabilities.
🔥19👍5
2 click Remote Code execution in Evernote Android
https://hackerone.com/reports/1377748
https://hackerone.com/reports/1377748
HackerOne
Evernote disclosed on HackerOne: 2 click Remote Code execution in...
This vulnerability is similar to my previous reported vulnerability #1362313 , in here also weakness is path transversal vulnerability which helps me to acheive code execution but the root cause...
👍11👏2