bugbounty_tech | Unsorted

Telegram-канал bugbounty_tech - Bug bounty Tips

2777

🛡️ Cybersecurity enthusiast | 💻 Helping secure the digital world | 🌐 Web App Tester | 🕵️‍♂️ OSINT Specialist Admin: @laazy_hack3r

Subscribe to a channel

Bug bounty Tips

Essential OSCP Exam Toolkit

Читать полностью…

Bug bounty Tips

#Tech_book
"Artificial Intelligence for Cybersecurity:
Develop AI approaches to solve cybersecurity problems in your organization", 2024.

// This book is for cybersecurity or general IT professionals or students who are interested in AI technologies and how they can be applied in the cybersecurity context

Читать полностью…

Bug bounty Tips

Evasion Attacks on LLMs - Countermeasures in Practice:
A Guide to face Prompt Injections, Jailbreaks and Adversarial Attacks
", Nov. 2025.

Читать полностью…

Bug bounty Tips

#MLSecOps
"InfoFlood (Information Overload) Attack:
Jailbreaking Large Language Models with Information Overload
", Jun 2025.

// In this work, we identify a new vulnerability in which excessive linguistic complexity can disrupt built-in safety mechanisms-without the need for any added prefixes or suffixes-allowing attackers to elicit harmful outputs directly

Читать полностью…

Bug bounty Tips

#OSINT
#AppSec
#Research
"Hey there! You are using WhatsApp: Enumerating Three Billion Accounts for Security and Privacy", NDSS 2026.
]-> https://github.com/sbaresearch/whatsapp-census

// To initiate conversations, users must first discover whether their contacts are registered on the platform. This is achieved by querying WhatsApp's servers with mobile phone numbers extracted from the user's address book. This architecture inherently enables phone number enumeration, as the service must allow legitimate users to query contact availability. While rate limiting is a standard defense against abuse, we revisit the problem and show that WhatsApp remains highly vulnerable to enumeration at scale

Читать полностью…

Bug bounty Tips

#AIOps
#MLSecOps
#Offensive_security
#Red_Team_Tactics
"AutoBackdoor: Automating Backdoor Attacks via LLMAgents", Nov. 2025.
]-> Code, datasets, and experimental configurations

// AutoBackdoor - general framework for automating backdoor injection, encompassing trigger generation, poisoned data construction, and model fine-tuning via an autonomous agent-driven pipeline. Unlike prior approaches, AutoBackdoor uses a powerful language model agent to generate semantically coherent, context-aware trigger phrases, enabling scalable poisoning across arbitrary topics with minimal human effort

Читать полностью…

Bug bounty Tips

https://coal-memory-97b.notion.site/Android-Pentest-1f6923af30cc80bdafa4f3c581f4c5f8

Читать полностью…

Bug bounty Tips

#tools
#cryptography
Critical cryptography vulnerabilities in the JavaScript elliptic library
https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof
// CVE-2024-48949, CVE-2024-48948 (unresolved)

See also:
]-> repository (updated) of test vectors of cryptographic libraries for known attacks

Читать полностью…

Bug bounty Tips

#AIOps
#MLSecOps
#RAG_Security
#Offensive_security
AI pentest scoping playbook
https://devansh.bearblog.dev/ai-pentest-scoping
// Scoping AI security engagements is harder than traditional pentests because the attack surface is larger, the risks are novel, and the methodologies are still maturing

Читать полностью…

Bug bounty Tips

#CogSec
#MLSecOps
Inside OpenAI Sora 2 -
Uncovering System Prompts Driving Multi-Modal LLMs

https://mindgard.ai/resources/openai-sora-system-prompts
// By chaining cross-modal prompts and clever framing, researchers surfaced hidden instructions from OpenAI’s video generator

Читать полностью…

Bug bounty Tips

#Research
"How Can We Effectively Use LLMs for Phishing Detection?: Evaluating the Effectiveness of Large Language Model-based Phishing Detection Models", 2025.

// This study investigates how to effectively leverage LLMs for phishing detection by examining the impact of input modalities (screenshots, logos, HTML, URLs), temperature settings, and prompt engineering strategies. We evaluate seven LLMs - two commercial models (GPT 4.1, Gemini 2.0 flash) and five open-source models (Qwen, Llama, Janus, DeepSeek-VL2, R1) - alongside two DL-based baselines (PhishIntention and Phishpedia). Our findings reveal that commercial LLMs generally outperform open-source models in phishing detection, while DL models demonstrate better performance on benign samples

Читать полностью…

Bug bounty Tips

#tools
#NetSec
#Research
"Multi Objective Optimization and AutoML based Intrusion Detection System", Nov. 2025.
]-> Repo

// In work, an innovative IDS utilizing Automated ML and Multi-Objective Optimization is proposed for autonomous and optimized attack detection in modern networking environments. The proposed IDS framework integrates two primary innovative techniques: Optimized Importance and Percentage-based Automated Feature Selection (OIP-AutoFS) and Optimized Performance, Confidence, and Efficiency-based Combined Algorithm Selection and Hyperparameter Optimization (OPCE-CASH)

Читать полностью…

Bug bounty Tips

#AppSec
#Whitepaper
#Threat_Research
"Comparative Analysis of Large Language Model Performance in Automated Threat Modeling: A WordPress Application Case Study", Aug. 2025.
]-> Repo

// This study investigates the use of LLMs as an assistant to conduct threat models of systems or apps. It researches the efficacy of a sample of modern LLMs against a constant system, a WordPress application deployed in Kubernetes. It compares the results based on four key metrics: threat coverage, completeness & depth of explanation, consistency, and false positive rate

Читать полностью…

Bug bounty Tips

#Analytics
#Threat_Research
An analytical review of the main cybersecurity events for the week (November 1-8, 2025)

1⃣  Breaking Down the Balancer v2 Hack
// The Balancer hack in 2025, caused by a longstanding rounding bug, highlights the need for rigorous math correctness, thorough testing, continuous security updates, and layered defenses in DeFi
]-> Analysis and guidance for DeFi ecosystem
2⃣  RDSEED Failure on AMD "Zen 5" Processors
// CVE-2025-62626. The RDSEED function for AMD’s Zen 5 processors does return 0 more often than it should...
3⃣  GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
// Based on recent analysis of the broader threat landscape, Google Threat Intelligence Group has identified a shift that occurred within the last year: adversaries are no longer leveraging AI just for productivity gains, they are deploying novel AI-enabled malware in active ops
]-> a comprehensive guide to developing AI/ML systems is available on the channel
4⃣  Improvements to Open VSX Security
// In reference to the Glassworm incident, OpenVSX published a blog post outlining some of the security improvements they will make to prevent a repeat of this incident
5⃣  MS Teams Impersonation and Spoofing Vulnerabilities
// four vulnerabilities in MS Teams that allow attackers to impersonate executives, manipulate messages, alter notifications, and forge identities in video/audio calls. Both external guest users and malicious insiders could exploit these flaws
6⃣ The channel's most read publication in October
// Don’t Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites

]-> Analytical review (Oct.25 - Nov.1, 2025)

Читать полностью…

Bug bounty Tips

Het Hunter's,
DarkShadow here back again!

✅CRLF injection Explain🔥

This vulnerability allow an attacker to add there custom header on the responds! If you can inject \r\n.


☠️Impact (it can chain with):
1. XSS
2. open redirection
3. Cache Poisoning
4. Session Fixation [Inject custom Set-Cookie: eaders]
5. Inject Access-Control-Allow-Origin: * [make CORS]
6. CORS bypass to Sensitive Info Leak
7. Web Cache Deception
8. Phishing via Responds manipulation [\r\n\r\n<h1>Hacked</h1>]

Now Guy's show your love ❤️

#bugbountytips #crlf

Читать полностью…

Bug bounty Tips

API Pentesting Series — Part 7

Before you attack APIs, you need a solid lab.
This part covers:
• Tooling (Burp, DevTools, Postman)
• Discovery tools (Kiterunner, Nikto)
• Docker-based vulnerable APIs
• Full environment setup

Notion Notes 🔗: https://notion.so/aacle/PART-7-API-PenTesting-Series-LAB-SETUP-2b9f7b9ea30e809f8e8ddc938eb0fb1a

Читать полностью…

Bug bounty Tips

Common Rate Limit Bypass Techniques

IP Spoofing
Altering a request’s source IP to appear from another device, and rotating IPs lets an attacker bypass per-IP limits. You can use the following Burp Extensions for IP Spoofing:

BurpFakeIP: GitHub
IP-Rotate: GitHub

Changing User-Agent
Rate-limit systems often track the User-Agent header; changing or randomizing it makes requests appear from different clients, and attackers may brute-force the User-Agent field (e.g., with tools like Burp Suite Intruder).

Header Manipulation
Header manipulation alters HTTP headers (e.g., X-Forwarded-For, X-Real-IP) to trick servers — bypassing IP restrictions, evading rate limits, or hiding the real IP from logs and filters.

Common Headers by 🕷Spix0r

Requesting with Different HTTP Methods
Some rate-limiters monitor only certain HTTP methods (e.g., GET/POST); attackers may bypass them by sending requests with other methods (PUT, DELETE, OPTIONS) and testing alternatives (e.g., with Burp Suite Repeater).

HTTP request methods

Parameter Name Variation
Some backends accept alternate parameter names and still process requests, enabling attackers to bypass input filters, WAFs, or login restrictions.

username=admin&password=1234
user=admin&pass=1234
uname=admin&pwd=1234
login=admin&passwd=1234
u=admin&p=1234
email=admin&key=1234
id=admin&token=1234


Encoding Tricks
Encoding represents characters in different formats; attackers use encoding to obfuscate payloads and bypass input filters, WAFs, or validation rules.
user=admin%20        # space after admin
user=admin%00 # null byte injection
user=%61%64%6d%69%6e # 'admin' in hex
user=ad%6Din # only 'm' is encoded
user=%2561%2564%256d%2569%256e # double-encoded 'admin'


Case Sensitivity and Font Tricks
Case or character-variant changes in strings (emails, usernames, paths) can let attackers bypass security checks or exploit improper validation.
Email: Test@Example.com  # Mixed case
Email: test@example.com # Lowercase
Email: TEST@example.com # Uppercase


Using Look-Alike Characters
Email: t3st@3xample.com   # '3' instead of 'e'
Email: t@est@example.com # Replacing 'l' with 'I' or vice versa


Blank Characters
Inserting spaces, null bytes, or invisible characters (e.g., TAB, CRLF) can bypass filters, break input validation, or exploit server input handling.
email=" test@example.com "  # Adding spaces at the beginning and end
email=test@example.com%20 # Adding a space encoded as %20
email=test@example.com%E2%80%8B # Injecting a zero-width space
email=test@example.com%09 # Tab character
email=test@example.com%0A # Newline character


#bugbounty #ratelimit

Читать полностью…

Bug bounty Tips

How I track the latest CVEs — top 20, fast 🔥

curl -s 'https:/ /cvedb.shodan.io/cves' \
| jq -r '.cves[:20][]?.cve_id'

==> Want id+summary?

curl -s 'https:/ /cvedb.shodan.io/cves' \
| jq '[.cves
| sort_by(.published? // .Published? // .modified? // "1970-01-01")
| reverse
| .[:20][]? | {cve_id, summary}]'


Note : Make sure you remove the space between https:/ and /cvedb before using the command must be https://

Tool: cvedb.shodan.io

Читать полностью…

Bug bounty Tips

#exploit
1⃣ CVE-2025-50165:
Critical Flaw (RCE) in Windows Graphics Component

// Windows 11 24H2 x64/ARM64, Windows Server 2025
2⃣ CVE-2025-9491:
Windows UI misrepresentation vulnerability
// PoC tool for demonstrating the Windows Shortcut (LNK) file vulnerability 
3⃣ CVE-2025-60718:
Windows 11 Insider Preview EoP
// Vulnerability exists in the Windows Administrator Protection feature that allows a low privileged process to get full access to a UI Access process which can be leveraged to access to a shadow administrator process leading to EoP

Читать полностью…

Bug bounty Tips

#Research
#MLSecOps
"Defending Large Language Models Against Jailbreak Exploits with Responsible AI Considerations", 2025.
]-> Repo

// This work presents a systematic taxonomy of existing jailbreak defenses across prompt-level, model-level, and training-time interventions, followed by three proposed defense strategies

Читать полностью…

Bug bounty Tips

#Analytics
#Threat_Research
An analytical review of the main cybersecurity events for the week (November 15-22, 2025)

1⃣  With blazing-fast WiFi 7 speeds come extra security risks
// Bitdefender's Practical Tips for Protecting Your Data on WiFi 7 Networks
2⃣  New RCE vulnerabilities in D-Link DIR-878 routers
// CVE-2025-60672, CVE-2023-60673, CVE-2025-60674, CVE-2025-60676. The device is still available for purchase, but support ended in 2021...
3⃣  Oracle E-Business Suite RCE (CVE-2025-61882)
// PoC + Detect Scripts
4⃣  BADAUDIO Malware
// This nearly three-year campaign is a clear example of the continued evolution of APT24’s operational capabilities
5⃣  IBM AIX NIMSH High Criticality Vulnerabilities
// CVE-2025-36251, CVE-2025-36250, CVE-2025-36096, CVE-2025-36236
6⃣  Cloudflare outage on Nov. 18, 2025
// The issue was not caused, directly or indirectly, by a cyber attack or malicious activity of any kind
7⃣ Multiple OS command injection in Fortinet API and CLI
// CVE-2025-64446 and CVE-2025-58034

]-> Analytical review (Nov. 8-15, 2025)

Читать полностью…

Bug bounty Tips

When comments aren't just comments

<script>
delete/delete; //alert(1)
typeof/typeof; //alert(2)
void/void; //alert(3)
throw/throw; //alert(4)
</script>

demo: https://jsfiddle.net/yo0a24dj/
source: https://x.com/nowaskyjr/status/1983273567111524544

Читать полностью…

Bug bounty Tips

#tools
#Mobile_Security
"A Comprehensive Study on Static Application Security Testing (SAST) Tools for Android", 2024.
]-> A Unified Platform for Evaluating SAST Tools for Android

// We propose a unified platform named VulsTotal, supporting various vulnerability types, enabling comprehensive and versatile analysis across diverse SAST tools. We also redefine and implement a standardized reporting format, ensuring uniformity in presenting results across all tools. Additionally, to mitigate the problem of benchmarks, we conducted a manual analysis of huge amounts of CVEs to construct a new CVE-based benchmark

Читать полностью…

Bug bounty Tips

#SCA
#tools
#cryptography
"Automated Side-Channel Analysis of Cryptographic Protocol Implementations", Nov. 2025.
]-> Automated Side-Channel Analysis of Cryptographic Protocols Implementations + PoC attack implementation

// Key contributions: (1) the first formal model of WhatsApp, extracted from its binary, (2) a framework to integrate side-channel leakage contracts into protocol models for the first time, (3) revealing critical vulnerabilities invisible to specification-based methods

Читать полностью…

Bug bounty Tips

#tools
#Cloud_Security
#Offensive_security
"Azure Pentest: Tools and Techniques", 2025.

Читать полностью…

Bug bounty Tips

#reversing
#MLSecOps
#Cyber_Education
"Reverse Engineering GPT", 2024.
https://github.com/mytechnotalent/RE-GPT

// Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you on an immersive journey into the inner workings of GPT. Step-by-step, we’ll construct a GPT model from the ground up, demystifying its architecture and bringing its mechanics to life through hands-on coding

See also:
Neural Networks: Zero to Hero

Читать полностью…

Bug bounty Tips

#AIOps
#Fuzzing
#Offensive_security
"AI for AppSec and Offensive Security: From Automation to Autonomy", BSides Berlin, 2025.

]-> AI-powered workflow automation and AI Agents for AppSec, Fuzzing & Offensive Security

Читать полностью…

Bug bounty Tips

#AppSec
#Cloud_Security
1⃣ PoC for CVE-2025-49844, CVE-2025-46817 and CVE-2025-46818 Critical Lua Engine Vulnerabilities
https://redrays.io/blog/poc-for-cve-2025-49844-cve-2025-46817-and-cve-2025-46818-critical-lua-engine-vulnerabilities
// Three critical vulnerabilities in Redis 7.4.5
2⃣ Hunting for Bucket Traversals in Google's Client Libraries
https://jdomeracki.github.io/2025/05/04/hunting_for_bucket_traversals
// Bucket traversal to be an underresearched class of vulnerabilities, requiring significant context-specific knowledge for comprehensive understanding

Читать полностью…

Bug bounty Tips

The perils of the “real” client IP & X-Forwarded-For Header

You've probably seen headers like these in common 403-bypass wordlists (e.g., my gist):

X-Forwarded-For: 127.0.0.1
X-Forwarded-Host: 127.0.0.1
X-Client-IP: 127.0.0.1

…and hundreds of similar variations (with 127.0.0.1, localhost, 192.168.1.1, internal IPs, etc.), but have you ever stopped to wonder why they sometimes actually work to bypass IP-based restrictions, rate limits, or 403/401 responses?

The answer lies in how unreliable and inconsistent the handling of "real client IP" headers is when a web application sits behind a reverse proxy (whether that’s a CDN like Cloudflare, an AWS ALB, a simple Nginx instance, etc.). It’s quite challenging for developers, because there’s no universal, standardized way for proxies to convey the original visitor’s IP to the backend and even less consensus on how the backend should parse and trust that information.

As a result, developers often rely on headers like X-Forwarded-For, X-Real-IP, or True-Client-IP to detect a visitor’s “real” IP address. But many frameworks use fragile logic especially the common pattern of trusting the left-most value in X-Forwarded-For. This is dangerous because the left-most entry is fully controlled by the client.

Cloudflare, AWS ALB, and many other proxies append the real IP to the header instead of overwriting it. So an attacker can send:
X-Forwarded-For: 127.0.0.1

and it becomes:
127.0.0.1, <real attacker IP>

Many libraries (like go-chi/httprate in Go) will mistakenly trust that spoofed first value. The app then believes the user is localhost or a trusted internal IP and may skip rate limits, authentication checks, or internal-only protections entirely.

This is not rare! dozens of frameworks and servers (Express, Jetty, IIS, Go libs, etc.) use inconsistent or insecure parsing strategies. The root problem: trusting client-controlled forwarding headers without restricting which proxies are allowed to set them.

I summarized the blog, but I highly recommend reading the full article here: Article

#bugbounty #recon #HTTP #bypass

Читать полностью…

Bug bounty Tips

🛡️ Bug Bounty Tip: Cloudflare 403 Bypass for Time-Based Blind SQLi

When your payload gets blocked by Cloudflare (403), try obfuscation with URL encoding to sneak it past!

❌ Blocked Payload

(select(0)from(select(sleep(10)))v) → 403 Forbidden

✅ Bypass Payload

(select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v)



🔍 This obfuscation can help trigger Time-Based Blind SQLi even when WAF protection is in place.

✅Credit: @nav1n0x

Читать полностью…
Subscribe to a channel