bugbounty_tech | Unsorted

Telegram-канал bugbounty_tech - Bug bounty Tips

2777

🛡️ Cybersecurity enthusiast | 💻 Helping secure the digital world | 🌐 Web App Tester | 🕵️‍♂️ OSINT Specialist Admin: @laazy_hack3r

Subscribe to a channel

Bug bounty Tips

🔍 Quick Win: Git Exposure → Secret Hunting 🔥

Step 1: Mass Git Config Hunt

nuclei -l alive_http_services.txt -id git-config


Step 2: Dump the repository
git-dumper https://target.com/ output/


Step 3: Hunt for secrets in dumped code
nuclei -u output/ -file


Jackpot:

- SaaS Keys in config files
- DB credentials in .env
- Internal API docs with admin endpoints

Lesson: Never stop at initial finding - always dig deeper! 🚀

https://www.youtube.com/watch?v=08sbpY0USqg&t=1058s

#bugbountytips

Читать полностью…

Bug bounty Tips

Cloudflare has recently started blocking proxy tools such as Burp Suite by detecting their unique TLS and request fingerprints.

If you encounter this issue, install the "Bypass Bot Detection" extension from the BApp Store. It spoofs Burp’s TLS fingerprint to resemble normal browser traffic and bypass the block.

https://github.com/PortSwigger/bypass-bot-detection

#bugbountytips

Читать полностью…

Bug bounty Tips

Not many know this: nuclei's param fuzzing skips a parameter after the first 10 payloads that return nothing.
So if the initial 10 tries don't trigger anything, that parameter gets ignored and you might miss interesting cases.

How to fix it: use -fuzz-param-frequency. It controls how many "uninteresting" payloads are allowed before nuclei skips a parameter (default is 10).

nuclei -h | grep frequency

...
-fuzz-param-frequency int frequency of uninteresting parameters for fuzzing before skipping (default 10)


An example of an automated pipeline (katana + nuclei) for fuzzing:

katana -u http://testphp.vulnweb.com -aff -iqp -j -o katana.jsonl && \
nuclei -l katana.jsonl -im jsonl -dast -fuzz-param-frequency 10000


Why this matters:

• Some endpoints only respond on later payloads (rate-limited, WAF behavior, timing issues).
• Increasing the frequency prevents skipping noisy-but-interesting params.
• Use with care — raising it a lot increases runtime and requests.

#bugbountytips

Читать полностью…

Bug bounty Tips

#exploit
#AppSec
"Copirate 365 at DEF CON: Plundering in the Depths of Microsoft Copilot", May 2026.
]-> https://embracethered.com/blog/posts/2026/defcon-talk-copirate-365

// The presentation walks through a chain of vulns (CVE-2026-24299) across the M365 Copilot family, incl. data exfiltration via the HTML preview feature, Delayed Tool Invocation as an exploit reliability trick, hijacking long-term memory, and combining all of the above into a persistent backdoor

Читать полностью…

Bug bounty Tips

#Kernel_Security
#Malware_analysis
DragonBreath: Dragon in the Kernel
https://ransom-isac.org/blog/dragonbreath-dragon-in-the-kernel
// A 0-day BYOVD vulnerability in dragoncore_k.sys signed by Zhengzhou 403 Network Technology, with shell company analysis, Dragon Breath APT-Q-27 attribution, and an APT31 / Wuhan Xiaoruizhi personnel nexus

Читать полностью…

Bug bounty Tips

#Offensive_security
Bypassing Windows (11 24H2/Server 2025) authentication reflection mitigations for SYSTEM shells
Part 1 (CVE-2025-33073)
Part 2 (CVE-2026-26128)
// Authentication relay (or reflection) attacks will persist as long as integrity mechanisms are not enforced by default on Windows services

Читать полностью…

Bug bounty Tips

#AppSec
#Tech_book
#Cloud_Security
"Container Security: Fundamental Technology Concepts that Protect Cloud Native Applications", 2026.

// you will learn about many of the building block technologies and mechanisms that are commonly used in container-based systems and how they are constructed in Linux. We will dive deep into the underpinnings of how containers work and how they communicate so that you are well versed not just in the "what" of container security but also, and more importantly, in the "why"

Читать полностью…

Bug bounty Tips

Escaping the Sandbox: Client-Side Template Injection (CSTI) via Outdated AngularJS: 0xTifo/escaping-the-sandbox-client-side-template-injection-csti-via-outdated-angularjs-887cc278f54a?source=rss------bug_bounty-5" rel="nofollow">https://medium.com/@0xTifo/escaping-the-sandbox-client-side-template-injection-csti-via-outdated-angularjs-887cc278f54a?source=rss------bug_bounty-5

Читать полностью…

Bug bounty Tips

Prototype Pollution: marduk.i.am/prototype-pollution-15f47d9e5c6a?source=rss------bug_bounty-5" rel="nofollow">https://medium.com/@marduk.i.am/prototype-pollution-15f47d9e5c6a?source=rss------bug_bounty-5

Читать полностью…

Bug bounty Tips

#Hardware_Security
"GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer", Apr. 2026.
]-> https://gpubreach.ca
]-> Repo

// GPUBreach shows that GPU Rowhammer attacks can move beyond data corruption to real privilege escalation. By corrupting GPU page tables, an unprivileged CUDA kernel can gain arbitrary GPU memory read/write, and then chain that capability into CPU-side escalation by exploiting newly discovered memory-safety bugs in the NVIDIA driver. The result is system-wide compromise up to a root shell, without disabling IOMMU, unlike contemporary works, making GPUBreach a more potent threat

Читать полностью…

Bug bounty Tips

#IoT_Security
#Automotive_Security
"When Flash Reveals Its Secrets:
Advanced Glitching Leveraging Hidden CPU-eMMC Behavior
", BlackHat Asia 2026.
]-> https://github.com/xcatx9527/wfm_cmp

// Complete process of successfully bypassing Secure Boot on real embedded devices using this method and reveal the physical leakage paths that exist between the CPU and peripheral storage during runtime

Читать полностью…

Bug bounty Tips

#Analytics
#Threat_Research
An analytical review of the main cybersecurity events for the week (Apr.18-25, 2026)

1⃣  Hacking Safari with GPT 5.4
// A Safari WebAssembly memory bug combined with fetch cloning flaws enabled cross-origin data leaks
2⃣  PhantomRPC: A new privilege escalation technique in Windows RPC
// PoC + Toolset
3⃣  Pentest Copilot
// An open-source, AI-driven penetration testing agent
4⃣  Uncovering Global Telecom Exploitation by Covert Surveillance Actors
// Weak screening of interconnect traffic allowed attackers to route surveillance messages through trusted operator pathways, enabling access to targeted networks
5⃣  Pack2TheRoot: Cross-Distro LPE Vulnerability
// CVE-2026-41651
6⃣  P4WNED: How Insecure Defaults in Perforce Expose Source Code Across the Internet
// Investigation Reveals Critical Security Gaps On Thousands of Servers Affecting Organisations Across Games, Healthcare, Finance, Government & More
7⃣  Kyber Ransomware Double Trouble
// Kyber is a cross-platform ransomware family targeting Linux/ESXi and Windows environments
8⃣ Claude-Red-Skills
// 38 offensive security skills for Claude
9⃣  WireGuard 1.0 for Windows

]-> Analytical review (Apr.11-18, 2026)

Читать полностью…

Bug bounty Tips

Cybersecurity Roadmap for 2026
https://hacklido.com/blog/1408-ultimate-cybersecurity-roadmap-for-2026

Читать полностью…

Bug bounty Tips

#tools
#DFIR
#Malware_analysis
1⃣ Official IOCX Project
// An extensible IOC extraction engine for PE binaries and text, built for SOC automation and modern threat‑analysis pipelines
2⃣ Crow Eye - Windows Forensics Engine
// Comprehensive Windows forensics tool
3⃣ Microsoft Sentinel SIEM Log Source Analyzer
// PowerShell module that connects to your MS Sentinel workspace (and Defender XDR), pulls every log table you’re ingesting

Читать полностью…

Bug bounty Tips

#exploit
#Kernel_Security
1⃣ Multiple vulnerabilities in AppArmor
https://cdn2.qualys.com/advisory/2026/03/10/crack-armor.txt
// AppArmor + Sudo + Postfix = root
2⃣ CVE-2026-29923:
LPE Attack via pstrip64.sys

https://github.com/athenasec16/CVE-2026-29923
// pstrip64.sys - legacy kernel-mode component. While its legitimate purpose is to enable advanced graphics card display tweaking, its deep system privileges make it a highly attractive target for attackers..

// Disclaimer

Читать полностью…

Bug bounty Tips

Want to report a scanner finding, but feel like writing it up is too tedious? 😅

Install the ReportLM extension and get Burp AI to do it for you!

Prompt example:

Generate a bug bounty report, outlining the finding summary, impact, provide full HTTP requests and CVSS scoring


#bugbountytips

Читать полностью…

Bug bounty Tips

🎯 CSP Takeover Hunting

Content-Security-Policy (CSP) whitelists trusted hosts for scripts/resources — but if a whitelisted domain is vulnerable to subdomain takeover (expired DNS, dangling CNAME, abandoned cloud service), an attacker can host malicious assets and bypass CSP.

How to find them:

Use cspgrabber - to extract domains/subdomains from CSP headers across your targets, then feed results to Nuclei’s subdomain-takeovers profile to detect takeovers that could bypass CSP.

One-liner example:

./cspgrabber -f alive_http_services.txt -c 40 -rps 120 -clean -o csp_domains.txt && \
nuclei -l csp_domains.txt -profile subdomain-takeovers -nh -o takeovers.txt


#bugbountytips

Читать полностью…

Bug bounty Tips

TLS-Based Recon for Attack Surface

Here's a fast and effective recon flow to find and scan hidden assets using TLS certificate metadata and Shodan dorking via Nuclei’s built-in Uncover engine.

Step 1:
Find subdomains with subfinder and use tlsx to extract TLS certificate metadata:

subfinder -d tesla.com | tlsx -nc -silent -so | awk '{for(i=2; i<=NF; i++) printf "%s ", $i; print ""}'| tr -d '[],' | sort -uf

📌 This gives you organization names from TLS certificates:

- Tesla Motors Inc.
- Microsoft Corporation
- Akamai Technologies Inc.


Step 2:
Use Nuclei's Uncover engine to automatically pull targets from Shodan using a dork with org name, and scan them:

export SHODAN_API_KEY=your_key_here && \

nuclei -rl 300 -nc -uc -ue -ul 10000 -uq 'org:"Tesla Motors Inc"' -silent


💡More about UncoverHow to use Uncover: Quickly discover exposed hosts using multiple search engines

#bugbountytips

Читать полностью…

Bug bounty Tips

#Purple_Team_Exercises
Cross-Session Activation
https://ipurple.team/2026/05/04/cross-session-activation
// Cross-Session activation attacks enable threat actors to run code or commands under the context of another user (local) or perform lateral movement (remote). Although the blast radius is limited by the requirement to identify hosts with interactive sessions in which the compromised user has privileges, the technique is considered highly effective, and detection has several constraints..

Читать полностью…

Bug bounty Tips

#tools
#RAG_Security
"CleanBase: Detecting Malicious Documents in RAG Knowledge Databases", May 2026.

// CleanBase - framework for detecting malicious documents in RAG systems’ knowledge database

Читать полностью…

Bug bounty Tips

#Research
#Offensive_security
GPT-5.5 vs Claude Opus 4.7 for Pentesting:
A Practical Workflow-Based Comparison

https://www.penligent.ai/hackinglabs/gpt-5-5-vs-claude-opus-4-7-for-pentesting-a-practical-workflow-based-comparison
// A model that writes convincing exploit code is not automatically useful for pentesting. A model that explains a vulnerability clearly is not automatically able to verify it. A model that scores well on coding or agent benchmarks is not automatically safe to connect to scanners, browsers, shells, credentials, or production-like targets...

Читать полностью…

Bug bounty Tips

Prototype Pollution Guide: Vulnerabilities, Attack Vectors, and RCE: jpablo13/prototype-pollution-guide-vulnerabilities-attack-vectors-and-rce-82100c1baf40?source=rss------bug_bounty-5" rel="nofollow">https://medium.com/@jpablo13/prototype-pollution-guide-vulnerabilities-attack-vectors-and-rce-82100c1baf40?source=rss------bug_bounty-5

Читать полностью…

Bug bounty Tips

Bypassing 4-Digit MFA — A HackSmarter Lab Writeup: cyberologist-bd/bypassing-4-digit-mfa-a-hacksmarter-lab-writeup-873052edf5de?source=rss------bug_bounty-5" rel="nofollow">https://medium.com/@cyberologist-bd/bypassing-4-digit-mfa-a-hacksmarter-lab-writeup-873052edf5de?source=rss------bug_bounty-5

Читать полностью…

Bug bounty Tips

COMMON HTTP ERROR CODES & Bypass Techniques: cybersecplayground/common-http-error-codes-bypass-techniques-d2d7a09ec062?source=rss------bug_bounty-5" rel="nofollow">https://medium.com/@cybersecplayground/common-http-error-codes-bypass-techniques-d2d7a09ec062?source=rss------bug_bounty-5

Читать полностью…

Bug bounty Tips

#NetSec
"One Char to Rule Them All:
Systematically Exploring and Exploiting DNS Silent Vulnerabilities in Domain Name Resolution
", BlackHat Asia 2026.

// we conducted the first systematic study of special character handling logic in DNS, reviewing DNS RFCs and analyzing 31 widely-used DNS software implementations through source code review and gray-box testing. Our systematic analysis reveals two new DNS logic vulnerabilities arising from inconsistencies and silent handling behaviors, leading to two classes of attacks that affect all DNS roles, including stub resolvers, forwarders, recursive resolvers, and authoritative nameservers

See also:
]-> RebirthDay Attack: Reviving DNS Cache Poisoning with the Birthday Paradox (.pdf)

Читать полностью…

Bug bounty Tips

#Hardware_Security
"Qualcomm BootROM:
A journey through Sahara
", BlackHat Asia 2026.

// This Briefing will present a comprehensive analysis of new vulnerabilities found by our team at the BootROM level: vulnerabilities in Emergency Download Mode and its Sahara protocol, which allow bypassing cryptographic verification of Secondary Boot Loader images and subsequent boot stages

See also:
]-> BlackHat Asia 2026 - ALL Briefings

Читать полностью…

Bug bounty Tips

#MLSecOps
#Threat_Research
"The Mother of All AI Supply Chains:
Critical, Systemic Vulnerability at the Core of Anthropic’s MCP", Apr. 2026.

// Enables unauthorized access to sensitive user data, internal databases, and API keys. Affects 150M+ downloads across Python, TypeScript, Java, and Rust MCP SDKs. Verified Zero-Click Prompt Injection in Cursor and Windsurf, plus "poisoned" MCP registries. Impacting industry staples like LangChain, LiteLLM, and IBM’s LangFlow

Читать полностью…

Bug bounty Tips

How I track the latest CVEs — top 20, fast 🔥

curl -s 'https:/ /cvedb.shodan.io/cves' \
| jq -r '.cves[:20][]?.cve_id'

==> Want id+summary?

curl -s 'https:/ /cvedb.shodan.io/cves' \
| jq '[.cves
| sort_by(.published? // .Published? // .modified? // "1970-01-01")
| reverse
| .[:20][]? | {cve_id, summary}]'


Note : Make sure you remove the space between https:/ and /cvedb before using the command must be https://

Tool: cvedb.shodan.io

Читать полностью…

Bug bounty Tips

#AIOps
"The Blind Spot of Agent Safety: How Benign User Instructions Expose Critical Vulnerabilities in Computer-Use Agents", Apr. 2026.

]-> Code
]-> Dataset

// a benchmark that evaluates CUAs under unintended attack conditions, comprising 300 human-crafted tasks across 12 categories, 8 apps, and 2 threat clusters: environment-embedded threats and agent-initiated harms

Читать полностью…

Bug bounty Tips

#MLSecOps
"Unreal Thinking: Chain-of-Thought Hijacking via Two-stage Backdoor", Apr 2026.
]-> Repo

// Attackers can compromise LLMs by hijacking the Chain-of-Thought process to hide malicious behaviors within seemingly logical reasoning. To address data scarcity and instability in such attacks, the researchers introduced tools and mitigations for generating synthetic malicious CoTs

Читать полностью…
Subscribe to a channel