Forwarded from Web Hacking
Rate limit bypass using some custom headers:
X-Forwarded-For: IP
X-Forwarded-IP: IP
X-Client-IP: IP
X-Remote-IP: IP
X-Originating-IP: IP
X-Host: IP
X-Client: IP
X-Forwarded-For: IP
X-Forwarded-IP: IP
X-Client-IP: IP
X-Remote-IP: IP
X-Originating-IP: IP
X-Host: IP
X-Client: IP
π3π€2
When trying for XSS if alert() is blocked you can use an alternative like:
1. Confirm
2. Prompt
3. Eval
4. Write
@WebHacking
1. Confirm
2. Prompt
3. Eval
4. Write
@WebHacking
π23
Bug Bounty Tip
Want to learn HTTP Request Smuggling?
Check out this incredible Workshop with over 120 minutes of theory, videos, and practice using Docker Labs
https://gosecure.github.io/request-smuggling-workshop/#0
Want to learn HTTP Request Smuggling?
Check out this incredible Workshop with over 120 minutes of theory, videos, and practice using Docker Labs
https://gosecure.github.io/request-smuggling-workshop/#0
π14β€1
A curated list of bugbounty writeups (Bug type wise)
https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
β€7π1
π₯OSCP Trainingπ₯π‘βοΈπ¨π»βπ» pinned Deleted message