Forwarded from The Bug Bounty Hunter
OTP bypass and Account takeover using response manipulation
https://infosecwriteups.com/otp-bypass-and-account-takeover-using-response-manipulation-685ad4e1ea76
https://infosecwriteups.com/otp-bypass-and-account-takeover-using-response-manipulation-685ad4e1ea76
Medium
OTP bypass and Account takeover using response manipulation
Who is Krishnadev P Melevila?
Forwarded from The Bug Bounty Hunter
Setup Your Private Burp Collaborator for SSRF/XXE
https://sicks3c.medium.com/setup-your-private-burp-collaborator-for-ssrf-xxe-fd6cf01c8ca
https://sicks3c.medium.com/setup-your-private-burp-collaborator-for-ssrf-xxe-fd6cf01c8ca
Medium
Setup Your Private Burp Collaborator for SSRF/XXE
Burp-suite Collaborator
Forwarded from The Bug Bounty Hunter
Fuzzing + IDOR = Admin TakeOver
https://medium.com/@gonzalocarrascosec/fuzzing-idor-admin-takeover-5343bb8f436e
https://medium.com/@gonzalocarrascosec/fuzzing-idor-admin-takeover-5343bb8f436e
Medium
Fuzzing + IDOR = Admin TakeOver
Hello everyone, this is my first post. I’ve been thinking about writing about my findings for a while, so here we go.
Forwarded from The Bug Bounty Hunter
A collection of tiny #XSS Payloads that can be used in different contexts.
https://tinyxss.terjanq.me
Via: https://twitter.com/ffranz/status/1425432025004191749
https://tinyxss.terjanq.me
Via: https://twitter.com/ffranz/status/1425432025004191749
tinyxss.terjanq.me
Tiny XSS Payloads
A collection of small XSS payloads
Forwarded from The Bug Bounty Hunter
Modify in-flight data to payment provider Smart2Pay
https://hackerone.com/reports/1295844
https://hackerone.com/reports/1295844
HackerOne
Valve disclosed on HackerOne: Modify in-flight data to payment...
I have found vulnerability which allows attacker to generate steam wallet balance.
Firstly you will have to change yours steam account email to something like (I will explain why in next steps,...
Firstly you will have to change yours steam account email to something like (I will explain why in next steps,...
Forwarded from The Bug Bounty Hunter
Chain of vulnerabilities in Uber for Business Vouchers program allows for attacker to perform arbitrary charges to victim's U4B payment account
https://hackerone.com/reports/1145428
https://hackerone.com/reports/1145428
HackerOne
Uber disclosed on HackerOne: Chain of vulnerabilities in Uber for...
We have determined that through a chain of 3 vulnerabilities, it is possible for any U4B user to apply credit card charges or holds to any business using the Vouchers site. These charges originate...
Forwarded from The Bug Bounty Hunter
Holy FFUF! — A Beginner Guide to Fuzz with FFUF
https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391
https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391
Medium
Holy FFUF! — A Beginner Guide to Fuzz with FFUF
If you are a bug bounty hunter or security researcher, you must be familiar with a technique called Fuzzing. In case you just newly…
A modified version of the WhatsApp messaging app for Android has been trojanized to serve malicious payloads, display full-screen ads, and sign up device owners for unwanted premium subscriptions without their knowledge.
Read: https://thehackernews.com/2021/08/modified-version-of-whatsapp-for.html
Via @thehackernews
Read: https://thehackernews.com/2021/08/modified-version-of-whatsapp-for.html
Via @thehackernews
Forwarded from DIRECTOR️
Raz0r.name — Web Application Security
Using CodeQL to detect client-side vulnerabilities in web applications | Raz0r — Web3 Security
GitHub’s CodeQL is a robust query language originally developed by Semmle that allows you to look for vulnerabilities in the source code. CodeQL is known as a tool to inspect open source repositories, however its usage is not limited just to it. In this article…
How i made 15k$ from Remote Code Execution Vulnerability
https://amakki.me/how-i-made-15k-from-remote-code-execution-vulnerability-2e1b14b3902a
https://amakki.me/how-i-made-15k-from-remote-code-execution-vulnerability-2e1b14b3902a
Zero-Click RCE Exploit for the Peloton Bike (And Also Every Other Unpatched Android Device)
https://www.nowsecure.com/blog/2022/02/09/a-zero-click-rce-exploit-for-the-peloton-bike-and-also-every-other-unpatched-android-device/
https://www.nowsecure.com/blog/2022/02/09/a-zero-click-rce-exploit-for-the-peloton-bike-and-also-every-other-unpatched-android-device/
Nowsecure
Zero-Click RCE Exploit for the Peloton Bike Identified and Patched
The Peloton Bike ran an unpatched version of Android 7 which led to it being vulnerable to a number of known issues, most significantly CVE-2021-0326, which could allow an attacker within WiFi range to execute arbitrary code on the device with no user interaction.
Day 22 Cross Site Scripting — Part 1 #100DaysofHacking
https://infosecwriteups.com/day-22-cross-site-scripting-part-1-100daysofhacking-a9fe6d3a59c8?source=rss----7b722bfd1b8d---4
https://infosecwriteups.com/day-22-cross-site-scripting-part-1-100daysofhacking-a9fe6d3a59c8?source=rss----7b722bfd1b8d---4
Medium
Day 22 Cross-Site Scripting — Part 1 #100DaysofHacking
Get all the writeups from Day 1 to 21, Click Here Or Click Here.