home.social

#bugbountytips — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #bugbountytips, aggregated by home.social.

  1. Are you located in the US/EU? Passionate about #appsec? Maybe you follow #bugbountytips or are an avid #ctf player and are ready to take the next step. If so, we're looking for our next #intern, so consider applying today - hackers.doyensec.com.
    #doyensec #security #internship #bugbounty

  2. after a lengthy concept review, code review, and QA process, PortSwigger has published the Burp Variables extension to the BApp Store! if you do API testing from Burp, you should look into this productivity extension which allows you to store and reuse variables in your outgoing requests, similar to other API testing clients like Postman and Insomnia. this is a productivity boon because it gives you single place to update ephemeral credential/token values and it helps you keep track of your identifiers & credentials which minimizes false positives. to learn more:

    - install the extension from the BApp Store
    - see more details at the BApp Store page: portswigger.net/bappstore/27f8
    - review the source code at the extension's source repo: github.com/0xceba/burp_variabl

    #burp #burpsuite #burp_suite #pentesting #pentest #bugbounty #bugbountytips #hacking #cybersecurity #infosec

  3. Grafana Attack Surface: How a Visualization and Monitoring Platform Can Expose Your Organization's Data and File System to Attackers

    Article: hadess.io/grafana-attack-surfa

    #grafana #ssrf #directorytraversal #bugbountytips

  4. Amazing what a simple search can accomplish. #Dorks are your friend, as simple as they are. I like this one:

    "/password" "//password" "/apikey" "//apikey" "/token" "//token" xml

    What’s your favorite?

    github.com/Root-Down-Digital/p

    #bugbountytips #pentesting

  5. Seems 0day Vulnerability in ThinkPHP - if you are using it, ensure to update or take necessary precautions.

    Anyone validated this is working exploit?

    Also, How many uses it, I don't think many 🤔

    #thinkphp #bugbounty #bugbountytips #pentesting #php #phpdev #PhpDevelopers #infosec

  6. Seems 0day Vulnerability in ThinkPHP - if you are using it, ensure to update or take necessary precautions.

    Anyone validated this is working exploit?

    Also, How many uses it, I don't think many 🤔

    #thinkphp #bugbounty #bugbountytips #pentesting #php #phpdev #PhpDevelopers #infosec

  7. Seems 0day Vulnerability in ThinkPHP - if you are using it, ensure to update or take necessary precautions.

    Anyone validated this is working exploit?

    Also, How many uses it, I don't think many 🤔

    #thinkphp #bugbounty #bugbountytips #pentesting #php #phpdev #PhpDevelopers #infosec

  8. Seems 0day Vulnerability in ThinkPHP - if you are using it, ensure to update or take necessary precautions.

    Anyone validated this is working exploit?

    Also, How many uses it, I don't think many 🤔

    #thinkphp #bugbounty #bugbountytips #pentesting #php #phpdev #PhpDevelopers #infosec

  9. Seems 0day Vulnerability in ThinkPHP - if you are using it, ensure to update or take necessary precautions.

    Anyone validated this is working exploit?

    Also, How many uses it, I don't think many 🤔

    #thinkphp #bugbounty #bugbountytips #pentesting #php #phpdev #PhpDevelopers #infosec

  10. #ffuf - Fuzz Faster U Fool on multiple hosts

    for i in cat urls.txt; do ffuf -u $i/FUZZ -w wordlist.txt -mc 200,302,401 -se ;done

    github.com/ffuf/ffuf

    Pro Tip: If you are not finding any valid endpoints, try within a discovered path adding ..;/ to the url.

    ie site.tld/somedir/..;/FUZZ

    #bypass #payloads github.com/aufzayed/bugbounty/

    #bugbounty #bugbountytips #fuzzing #owasp #recon #osint

  11. GitHub dorks for AWS, Jira, Okta and secrets..

    Amazon AWS cloud:
    org:Target "bucket_name"
    org:Target "aws_access_key"
    org:Target "aws_secret_key"
    org:Target "S3_BUCKET"
    org:Target "S3_ACCESS_KEY_ID"
    org:Target "S3_SECRET_ACCESS_KEY"
    org:Target "S3_ENDPOINT"
    org:Target "AWS_ACCESS_KEY_ID"
    org:Target "list_aws_accounts"

    Okta, JIRA and other secrets:
    "target.com" password or secret
    "target.atlassian" password
    "target.okta" password
    "corp.target" password
    "jira.target" password
    "target.onelogin" password
    target.service-now password
    some time only "target"

    echo site.com | subfinder -silent -all | httpx -silent -path ".env",".mysql_history","echo $(echo $(</dev/stdin) | cut -d "." -f2).sql" -mc 200 -ports 80,443,8080,8443 | grep -E -i "AKIA[A-Z0-9]{16}"

    #bugbounty #bugbountytips #github #dorks