Forwarded from The Bug Bounty Hunter
URL Bar Spoofing Flaw in Safari for iOS 12.3 and iOS 13 Beta | CVE-2019–8727
https://medium.com/@justm0rph3u5/url-bar-spoofing-in-safari-for-ios-12-3-and-ios-13-beta-cve-2019-8727-d87490f8ee29
https://medium.com/@justm0rph3u5/url-bar-spoofing-in-safari-for-ios-12-3-and-ios-13-beta-cve-2019-8727-d87490f8ee29
Medium
URL Bar Spoofing in Safari for iOS 12.3 and iOS 13 Beta | CVE-2019–8727
While working for browser-based attacks on the URL bar, I learned a way where it was still possible to spoof address bar in safari. None…
Forwarded from The Bug Bounty Hunter
HTTP Desync Attacks: what happened next
https://portswigger.net/research/http-desync-attacks-what-happened-next
https://portswigger.net/research/http-desync-attacks-what-happened-next
PortSwigger Research
HTTP Desync Attacks: what happened next
Last month I published HTTP Desync Attacks: Request Smuggling Reborn. Since then, there's been a range of new developments. While vendors have been deploying fixes and publishing advisories, I've devi
Forwarded from The Bug Bounty Hunter
Tools to play around #JavaScript files + extracting URLs
Via: https://twitter.com/soaj1664ashar/status/1179710102871433216
Via: https://twitter.com/soaj1664ashar/status/1179710102871433216
Twitter
Ashar Javed
Tools to play around #JavaScript files + extracting URLs github.com/cablej/FileCha… github.com/003random/getJS github.com/nahamsec/JSPar… github.com/zseano/JS-Scan github.com/Lopseg/Jsdir github.com/jobertabma/rel… github.com/GerbenJavado/L… please add, if…
Confluence Unauthorized RCE Vulnerability (CVE-2019-3396) Analysis
https://paper.seebug.org/886/
https://paper.seebug.org/886/
Forwarded from The Bug Bounty Hunter
Subdomains Enumeration: what is, how to do it, monitoring automation using webhooks and centralizing your findings
https://medium.com/@edu4rdshl/subdomains-enumeration-what-is-how-to-do-it-monitoring-automation-using-webhooks-and-5e0a0c6d9127
https://medium.com/@edu4rdshl/subdomains-enumeration-what-is-how-to-do-it-monitoring-automation-using-webhooks-and-5e0a0c6d9127
Medium
Subdomains Enumeration: what is, how to do it, monitoring automation using webhooks and…
If you are reading is possibly because you:
Forwarded from The Bug Bounty Hunter
Abusing PHP strip tags to bypass modern WAF to exploit XSS
https://tasteofsecurity.com/security/php-strip-tags-to-bypass-waf-xss/
https://tasteofsecurity.com/security/php-strip-tags-to-bypass-waf-xss/
Forwarded from The Bug Bounty Hunter
Bug Bounty Methodology (TTP- Tactics, Techniques, and Procedures) V 2.0
https://medium.com/@nishantrustlingup/my-first-csrf-to-account-takeover-worth-750-1332641d4304
https://medium.com/@nishantrustlingup/my-first-csrf-to-account-takeover-worth-750-1332641d4304
Medium
My First CSRF to Account Takeover worth $750
Before I start. I want to take a moment to all who helped me learn Web Application Security and Bug Bounty Hunting! :)
Forwarded from The Bug Bounty Hunter
StoreFront API allows for a brute force attack on customer login by not timing out ALL attempts
https://hackerone.com/reports/708013
https://hackerone.com/reports/708013
HackerOne
Shopify disclosed on HackerOne: StoreFront API allows for a brute...
@clew noticed that the [`customerAccessTokenCreate` mutation](https://help.shopify.com/en/api/storefront-api/reference/mutation/customeraccesstokencreate) in the [Storefront...
Forwarded from The Bug Bounty Hunter