Webmin 0day remote code execution
https://twitter.com/shishi0_/status/1162694712177954819
https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html
https://twitter.com/shishi0_/status/1162694712177954819
https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html
Twitter
Shishi0_
"Webmin 0day remote code execution" Tl;Dr: Lack of input validation in the reset password function allows RCE (CVE-2019-15107). Over 13 0000 vulnerable on Shodan. PoC: /password_reset.cgi user=root&pam&expired&old=wrong | id https://t.co/kYKfq8v6Bb
YesWeHack & Alibaba Security Meetup challenge solution
Good for XSS study
https://blog.yeswehack.com/2019/06/25/yeswehack-alibaba-hackinggame-writeup/
Good for XSS study
https://blog.yeswehack.com/2019/06/25/yeswehack-alibaba-hackinggame-writeup/
Yes We Hack : Vulnerability Coordination through CrowdSourced Security
YesWeHack & Alibaba Security Meetup challenge solution - Yes We Hack : Vulnerability Coordination through CrowdSourced Security
The goal of the challenge was to find an XSS vulnerability on a minimalist website. It was composed of 3 steps of increasing difficulty in the form of extra security layer. All the payload are tested with Chrome 75. difficulty Escape GET value X-XSS-Protection…
Offensive Bug Bounty Hunter 2.0 Teaser
https://www.youtube.com/watch?v=TVaUhaK3-lo&feature=youtu.be
Version 1.0 can be downloaded here
https://xn--r1a.website/bug_hunting/2
https://www.youtube.com/watch?v=TVaUhaK3-lo&feature=youtu.be
Version 1.0 can be downloaded here
https://xn--r1a.website/bug_hunting/2
YouTube
Offensive Bug Bounty Hunter 2.0 Teaser
Hello, Friends Day has come today now Download the HackersEra APP My new course is releasing today it's Offensive Bug Bounty Hunter 2.0. If you want to know more about Contents visit below link
https://hackersera.com/p/?page=online-training
HackersEra APP…
https://hackersera.com/p/?page=online-training
HackersEra APP…
Removing any Facebook user's profile picture through GraphQL
https://philippeharewood.com/removing-profile-pictures-for-any-facebook-user/
https://philippeharewood.com/removing-profile-pictures-for-any-facebook-user/
XSS via HTTP Headers
https://brutelogic.com.br/blog/xss-via-http-headers/
https://brutelogic.com.br/blog/xss-via-http-headers/
Google Dorking for Bug Bounty Programs
https://twitter.com/sushiwushi2/status/1165282481567760385
https://github.com/sushiwushi/bug-bounty-dorks/blob/master/dorks.txt
https://twitter.com/sushiwushi2/status/1165282481567760385
https://github.com/sushiwushi/bug-bounty-dorks/blob/master/dorks.txt
Twitter
sushiwushi2
Feeling cute, so I gathered some Google Dorks to hunt external bug bounty programs, enjoy ❤️ https://t.co/Qd2psyNV4Z Suggestions are welcome! #bugbounty #bugbountytips
BYPASSING A CRAPPY WAF TO EXPLOIT A BLIND SQL INJECTION
https://robinverton.de/blog/2019/08/25/bug-bounty-bypassing-a-crappy-waf-to-exploit-a-blind-sql-injection/
https://robinverton.de/blog/2019/08/25/bug-bounty-bypassing-a-crappy-waf-to-exploit-a-blind-sql-injection/
Access portal of Facebook mobile retailers and see earnings and referrals reports
https://ysamm.com/?p=314
https://ysamm.com/?p=314
How a classical XSS can lead to persistent ATO Vulnerability?
https://hackademic.co.in/how-a-classical-xss-can-lead-to-persistent-ato-vulnerability/
https://hackademic.co.in/how-a-classical-xss-can-lead-to-persistent-ato-vulnerability/
Hackademic
How a classical XSS can lead to persistent ATO Vulnerability? | Hackademic
Hello Hunters, XSS (Cross Site Scripting) is really one of the most common bugs that we have found atleast once somewhere The thing that is not common is how we report it? Most of the Bug Bounty…
Android-Reports-and-Resources
https://github.com/B3nac/Android-Reports-and-Resources
https://github.com/B3nac/Android-Reports-and-Resources
GitHub
GitHub - B3nac/Android-Reports-and-Resources: A big list of Android Hackerone disclosed reports and other resources.
A big list of Android Hackerone disclosed reports and other resources. - GitHub - B3nac/Android-Reports-and-Resources: A big list of Android Hackerone disclosed reports and other resources.
HTTP Request Smuggling introduction, detection, exploitation and IRL example
https://twitter.com/s0md3v/status/1167451862351499265
https://twitter.com/s0md3v/status/1167451862351499265
Twitter
Somdev Sangwan
HTTP Request Smuggling Introduction: https://t.co/c1e0m8u4Kk Detection: https://t.co/FvmIeppVH1 Exploitation: https://t.co/4VuPNNk1YO IRL Example: https://t.co/2qyS4YSCvC
Solving intigriti 3rd XSS Challenge
https://blog.fadyothman.com/go-local-solving-intigriti-challenge-3/
https://blog.fadyothman.com/go-local-solving-intigriti-challenge-3/
Fady's Technical Blog
Go Local : Solving Intigriti 3rd XSS Challenge
A writeup for the third XSS challenge made by intigriti describing both failed and successful attempts at solving this challenge,
Forwarded from burpsuite (not official)
burpsuite_pro_v2.1.zip
279.3 MB
pass: 311138
java -jar burpsuite_pro_v2.1_BurpHelper.jar
java -jar burpsuite_pro_v2.1_BurpHelper.jar
Security analysis of <portal> element
https://research.securitum.com/security-analysis-of-portal-element/
https://research.securitum.com/security-analysis-of-portal-element/
research.securitum.com
Security analysis of <portal> element - research.securitum.com
Portal is a fairly new HTML element that is currently supported only in Chrome Canary behind the #enable-portals flag. Their main objective is to enable seamless transitions to the web by pre-rendering content in an iframe-like element that can be then “promoted”…
Graphql Abuse to Steal Anyone’s Address
https://blog.usejournal.com/graphql-bug-to-steal-anyones-address-fc34f0374417
https://blog.usejournal.com/graphql-bug-to-steal-anyones-address-fc34f0374417
Medium
Graphql Abuse to Steal Anyone’s Address
Introduction
How i found a 1500$ worth Deserialization vulnerability
https://medium.com/@D0rkerDevil/how-i-found-a-1500-worth-deserialization-vulnerability-9ce753416e0a
https://medium.com/@D0rkerDevil/how-i-found-a-1500-worth-deserialization-vulnerability-9ce753416e0a
Medium
How i found a 1500$ worth Deserialization vulnerability
Note before you start.