thebugbountyhunter | Unsorted

Telegram-канал thebugbountyhunter - The Bug Bounty Hunter

43247

Happy hunting! thebugbountyhunter.com hello@thebugbountyhunter.com

Subscribe to a channel

The Bug Bounty Hunter

Authorization bypass due to cache misconfiguration

rikeshbaniya/authorization-bypass-due-to-cache-misconfiguration-fde8b2332d2d" rel="nofollow">https://medium.com/@rikeshbaniya/authorization-bypass-due-to-cache-misconfiguration-fde8b2332d2d

Читать полностью…

The Bug Bounty Hunter

RCE on Xiaomi 13 Pro (CVE-2023-26324)
👉Exploitation:
1) Open URL in WebView
2) Inject JavaScript
3) Execute JavaScript Interface functions from vulnerable GetApps to install & launch payload
4) Get shell

👉Slides with PoC: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Ken%20Gannon%20Ilyes%20Beghdadi%20-%20Xiaomi%20The%20Money%20Our%20Toronto%20Pwn2Own%20Exploit%20and%20Behind%20The%20Scenes%20Story.pdf

Читать полностью…

The Bug Bounty Hunter

SSRFing the Web with the help of Copilot Studio

https://www.tenable.com/blog/ssrfing-the-web-with-the-help-of-copilot-studio

Читать полностью…

The Bug Bounty Hunter

Discovering a Session Persistence Vulnerability That Led to a $$$$ Bounty

https://anonysm.medium.com/discovering-a-session-persistence-vulnerability-225e4b38e605

Читать полностью…

The Bug Bounty Hunter

NIST CSF 2.0 and Pentesting: What You Need to Know

https://www.hackerone.com/security-compliance/nist-csf-pentesting

Читать полностью…

The Bug Bounty Hunter

Walkthrough of CVE-2023-7028 - Account Takeover via Password Reset

https://youtu.be/ydg95R2QKwM?si=67uHSktsboqAoNft

Читать полностью…

The Bug Bounty Hunter

CVE-2024-7646: Ingress-NGINX Annotation Validation Bypass

https://www.armosec.io/blog/cve-2024-7646-ingress-nginx-annotation-validation-bypass/

Читать полностью…

The Bug Bounty Hunter

XSS via CSPT and Open Redirect - Solution to August '24 Challenge (Defcon)

https://www.youtube.com/watch?v=yGRRGUtT9MU

Читать полностью…

The Bug Bounty Hunter

Creating a Malicious Atlassian Plugin

https://cyllective.com/blog/posts/atlassian-malicious-plugin

Читать полностью…

The Bug Bounty Hunter

Apply "display: block" to script tags to view them like p tags!

https://www.youtube.com/watch?v=aOA53HXsyVk

Читать полностью…

The Bug Bounty Hunter

Wormable Substack XSS

https://blog.calif.io/p/wormable-substack-xss

Читать полностью…

The Bug Bounty Hunter

Breaking the Barrier: Admin Panel Takeover Worth $3500


noob.assassin/breaking-the-barrier-admin-panel-takeover-worth-3500-78da79089ca3" rel="nofollow">https://medium.com/@noob.assassin/breaking-the-barrier-admin-panel-takeover-worth-3500-78da79089ca3

Читать полностью…

The Bug Bounty Hunter

Security Code Review: Finding XML vulnerabilities in Code​ [1/2]

https://www.muqsitbaig.com/blog/security-code-review-finding-xxes-in-code/

Читать полностью…

The Bug Bounty Hunter

3 Bug Bounty Lessons From Retail & eCommerce Customers

https://www.hackerone.com/customer-stories/retail-ecommerce-lessons

Читать полностью…

The Bug Bounty Hunter

Gitxray: a security X-Ray for GitHub repositories

https://blog.kulkan.com/gitxray-a-security-x-ray-for-github-repositories-af8322350db4

Читать полностью…

The Bug Bounty Hunter

My Trip to DEF CON & Black Hat

https://www.youtube.com/watch?v=bhQ6FF3fCdA

Читать полностью…

The Bug Bounty Hunter

HackerOne Company Values Matter: Execute with Excellence

https://www.hackerone.com/culture-and-talent/hackerone-company-values-matter-execute-excellence

Читать полностью…

The Bug Bounty Hunter

DEFCON 32 Vlog

https://www.youtube.com/watch?v=Ohr5KibrPhA

Читать полностью…

The Bug Bounty Hunter

We wrote the code, and the code won

https://blog.trailofbits.com/2024/08/15/we-wrote-the-code-and-the-code-won/

Читать полностью…

The Bug Bounty Hunter

GitHub - ahussam/url-tracker: Change monitoring app that checks the content of web pages in different periods.

https://github.com/ahussam/url-tracker

Читать полностью…

The Bug Bounty Hunter

Security Flaws in Privilege Downgrades: How Users Can Exploit API Keys and Privilege escalation


Az3m/security-flaws-in-privilege-downgrades-how-users-can-exploit-api-keys-and-privilege-escalation-886b37c2344d" rel="nofollow">https://medium.com/@Az3m/security-flaws-in-privilege-downgrades-how-users-can-exploit-api-keys-and-privilege-escalation-886b37c2344d

Читать полностью…

The Bug Bounty Hunter

Exploiting HuggingFace’s Assistants to Extract Users’ Data

https://www.lasso.security/blog/exploiting-huggingfaces-assistants-to-extract-users-data

Читать полностью…

The Bug Bounty Hunter

Latest Nuclei Release v3.3.1!

https://github.com/projectdiscovery/nuclei/releases/tag/v3.3.1

Читать полностью…

The Bug Bounty Hunter

Hack My Career: Advice from HackerOne Employees

https://www.hackerone.com/culture-and-talent/hack-my-career-advice-hackerone-employees

Читать полностью…

The Bug Bounty Hunter

Mixing watering hole attacks with history leak via CSS |

https://adepts.of0x.cc/css-history-leaks/

Читать полностью…

The Bug Bounty Hunter

HackerOne's List of Top 10 AI EMB(arrassments)

https://www.hackerone.com/ai/top-10-ai-embarrassments

Читать полностью…

The Bug Bounty Hunter

We are bug bounty hunters. #bugbounty #hacking

https://www.youtube.com/watch?v=Xsg7IwWbRZ8

Читать полностью…

The Bug Bounty Hunter

Gotta cache 'em all: bending the rules of web cache exploitation

https://portswigger.net/research/gotta-cache-em-all

Читать полностью…

The Bug Bounty Hunter

Keeping your Android device safe from text message fraud

http://security.googleblog.com/2024/08/keeping-your-android-device-safe-from.html

Читать полностью…

The Bug Bounty Hunter

How I got my first $13500 bounty through Parameter Polluting (HPP)

https://medium.com/bugbountywriteup/how-i-got-my-first-13500-bounty-through-parameter-polluting-hpp-179666b8e8bb

Читать полностью…
Subscribe to a channel