Forwarded from The Bug Bounty Hunter
joonas.fi
SAML is insecure by design
What is SAML? Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties.
Source: Wikipedia
SAML is often used for single-sign on (“Sign in with Google”, “Sign in with Twitter” etc.).…
Source: Wikipedia
SAML is often used for single-sign on (“Sign in with Google”, “Sign in with Twitter” etc.).…
Forwarded from The Bug Bounty Hunter
The latest bug bounty programs for August 2021
https://portswigger.net/daily-swig/bug-bounty-radar-the-latest-bug-bounty-programs-for-august-2021
https://portswigger.net/daily-swig/bug-bounty-radar-the-latest-bug-bounty-programs-for-august-2021
The Daily Swig | Cybersecurity news and views
Bug Bounty Radar // The latest bug bounty programs for August 2021
New web targets for the discerning hacker
Forwarded from The Bug Bounty Hunter
Webpack Exploder
Unpack the source code of React and other Webpacked Javascript apps! Check out Expanding the Attack Surface: React Native Android Applications to learn how to turbocharge your React hacking.
https://spaceraccoon.github.io/webpack-exploder/
Unpack the source code of React and other Webpacked Javascript apps! Check out Expanding the Attack Surface: React Native Android Applications to learn how to turbocharge your React hacking.
https://spaceraccoon.github.io/webpack-exploder/
spaceraccoon.github.io
Webpack Exploder
Unpack the source code of React and other Webpacked Javascript apps!
Forwarded from The Bug Bounty Hunter
Security researcher finds dangerous bug in Chromium, nabs $15,000 bounty
https://portswigger.net/daily-swig/security-researcher-finds-dangerous-bug-in-chromium-nabs-15-000-bounty
https://portswigger.net/daily-swig/security-researcher-finds-dangerous-bug-in-chromium-nabs-15-000-bounty
The Daily Swig | Cybersecurity news and views
Security researcher finds dangerous bug in Chromium, nabs $15,000 bounty
Site isolation security break uncovered
Forwarded from The Bug Bounty Hunter
$50k bug bounty on Shopify explained (GitHub access token leaked via electron application)
https://youtu.be/xOoWHKOphK0
https://youtu.be/xOoWHKOphK0
YouTube
$50k bug bounty on Shopify explained (GitHub access token leaked via electron application)
In this video we walk through how a security researcher named Augusto Zanellato was able to discover a GitHub Personal Access Token (PAT) that had read/write access to private Shopify repositories, and earned them a $50,000USD bounty!
You can read the report…
You can read the report…
Forwarded from Android Security & Malware
Facebook Messenger for Android indirect thread deletion vulnerability
https://servicenger.com/blog/mobile/android/facebook-messenger-for-android-indirect-thread-deletion/
https://servicenger.com/blog/mobile/android/facebook-messenger-for-android-indirect-thread-deletion/
Forwarded from The Bug Bounty Hunter
Internal Gitlab Ticket Disclosure via External Slack Channels
https://hackerone.com/reports/1273292
https://hackerone.com/reports/1273292
Forwarded from The Bug Bounty Hunter
Forwarded from The Bug Bounty Hunter
Intigriti’s PHP challenge breakdown https://securitygoat.medium.com/intigritis-php-challenge-breakdown-178f5d003986
Forwarded from The Bug Bounty Hunter
Built from the ground up in Rust, Caido aims to help security professionals and enthusiasts audit web applications with efficiency and ease
https://caido.io/
https://caido.io/
Caido
Caido aims to help security professionals and enthusiasts audit web applications with efficiency and ease.
Forwarded from The Bug Bounty Hunter
What is BOLA? 3-digit bounty from Topcoder ($$$)
https://infosecwriteups.com/what-is-bola-3-digit-bounty-from-topcoder-a25e7fae0d64
https://infosecwriteups.com/what-is-bola-3-digit-bounty-from-topcoder-a25e7fae0d64
Medium
What is BOLA? 3-digit bounty from Topcoder ($$$)
This write-up will be about Broken Object Level Authorization (BOLA), which is #1 topic of API Security 101 (OWASP).
Forwarded from The Bug Bounty Hunter
Insecure Bundler configuration fetching internal Gems (okra) from Rubygems.org
https://hackerone.com/reports/1104874
https://hackerone.com/reports/1104874
HackerOne
Basecamp disclosed on HackerOne: Insecure Bundler configuration...
I found an internal gem (Ruby library) in use by Basecamp that was not registered on Rubygems (the public Ruby package repository). I registered a gem of my own under the name that would call back...
Forwarded from The Bug Bounty Hunter
OTP bypass and Account takeover using response manipulation
https://infosecwriteups.com/otp-bypass-and-account-takeover-using-response-manipulation-685ad4e1ea76
https://infosecwriteups.com/otp-bypass-and-account-takeover-using-response-manipulation-685ad4e1ea76
Medium
OTP bypass and Account takeover using response manipulation
Who is Krishnadev P Melevila?
Forwarded from The Bug Bounty Hunter
Setup Your Private Burp Collaborator for SSRF/XXE
https://sicks3c.medium.com/setup-your-private-burp-collaborator-for-ssrf-xxe-fd6cf01c8ca
https://sicks3c.medium.com/setup-your-private-burp-collaborator-for-ssrf-xxe-fd6cf01c8ca
Medium
Setup Your Private Burp Collaborator for SSRF/XXE
Burp-suite Collaborator
Forwarded from The Bug Bounty Hunter
Fuzzing + IDOR = Admin TakeOver
https://medium.com/@gonzalocarrascosec/fuzzing-idor-admin-takeover-5343bb8f436e
https://medium.com/@gonzalocarrascosec/fuzzing-idor-admin-takeover-5343bb8f436e
Medium
Fuzzing + IDOR = Admin TakeOver
Hello everyone, this is my first post. I’ve been thinking about writing about my findings for a while, so here we go.
Forwarded from The Bug Bounty Hunter
A collection of tiny #XSS Payloads that can be used in different contexts.
https://tinyxss.terjanq.me
Via: https://twitter.com/ffranz/status/1425432025004191749
https://tinyxss.terjanq.me
Via: https://twitter.com/ffranz/status/1425432025004191749
tinyxss.terjanq.me
Tiny XSS Payloads
A collection of small XSS payloads
Forwarded from The Bug Bounty Hunter
Modify in-flight data to payment provider Smart2Pay
https://hackerone.com/reports/1295844
https://hackerone.com/reports/1295844
HackerOne
Valve disclosed on HackerOne: Modify in-flight data to payment...
I have found vulnerability which allows attacker to generate steam wallet balance.
Firstly you will have to change yours steam account email to something like (I will explain why in next steps,...
Firstly you will have to change yours steam account email to something like (I will explain why in next steps,...